• Title/Summary/Keyword: Cyber language

Search Result 141, Processing Time 0.026 seconds

Web-based Cyber Instruction for EFL Learning

  • Cha Mi-Yang
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.209-216
    • /
    • 2005
  • The aim of this study is to examine the effects of web-based cyber instruction on EFL learning from the viewpoint of learners` perceptions and needs. Data was collected through a questionnaire survey that was carried out with 709 undergraduate student enrolled in three cyber English courses offered at N university during the secind semester in 2004. The results of the study indicated that the learners exhibited a positive attitude towards web-based cyber instruction and considered it a paper educational method in the cyber age. However, the students perceived that web-based cyber instruction was not greatly satisfactory in terms of cultivating their English communicative competence or improving the language skills they needed. It was also found that cyber instruction was still teacher-dominant, lacking in interaction, which made the students passive recipients of informaton presented. In comparison with off-line instruction, cyber instruction was not particularly better in enhancing their motivation interest or concentration on class. To be more effective, cyber instruction needs to be equipped not only with a large variety of contents and class activities, but also with more exposure to authentic language by native English speakers. The finding of the investigation yield some implications for the design and development of web-based cyber EFL programs.

  • PDF

Instructional Design in the Cyber Classroom for Secondary Students' Basic English Language Competence

  • Chang, Kyung-Suk;Pae, Jue-Kyoung;Jeon, Young-Joo
    • International Journal of Contents
    • /
    • v.12 no.2
    • /
    • pp.49-57
    • /
    • 2016
  • This paper aims to explore instructional design of a cyber classroom for secondary students' basic English language competence. A paucity of support for low or under achieving students' English learning exists particularly at the secondary level. In order to bridge the gap, there has been demand for online educational resources considered to be an effective tool in improving students' self-directed learning and motivation. This study employs a comprehensive approach to instructional design for the asynchronous cyber classroom with the underlying premise that different learning theories can be applied in a complementary manner to serve different pedagogical purposes best. Gagné's conditions of learning theory, Bruner's constructivist theory, Carroll's minimalist theory, and Vygotsky's social cognitive development theory serve as the basis for designing instruction and selecting appropriate media. The ADDIE model is used to develop online teaching and learning materials. Twenty-five key grammatical features were selected through the analysis of the national curriculum of English, being grouped into five units. Each feature is covered in one cyber asynchronous class. An Integration Class is given at the end of every five classes for synthesis, where students can practice grammatical features in a communicative context. Related theories, pedagogical practices, and practical web-design strategies for cyber Basic English classes are discussed with suggestions for research, practice and policy to support self-directed learning through a cyber class.

Rhyme of Truce, Training Program for moral psychology in Cyberspace

  • Cho, JeongHee;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.176-183
    • /
    • 2019
  • Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

Study on Various Factors Associated with the Effects of Cyber Home Study in Korean Language Education based on Structural Equation Model (구조방정식을 이용한 국어 사이버 가정학습의 효과 관련 요인에 관한 연구)

  • Lim, Mi-Ja;Baek, Hyeon-Gi
    • Journal of Digital Convergence
    • /
    • v.6 no.1
    • /
    • pp.83-91
    • /
    • 2008
  • The objective of this research is to assess various factors affecting E-learning in Korean language education. In this research, we hypothesize that several factors such as absorption, motivation and tutors increase the educational effects of E-learning and ultimately affect learning attitude and satisfaction of students in E-learning. To discuss the hypothesis, we analyzed survey data of 300 students who were taking E-learning class of Korean language for three weeks in October 2007 based on Structural Equation Model. The result of our analysis shows that the factors such as absorption, motivation, tutors have positive effects on E-learning in Korean language education and positive influence on learning attitude and satisfaction on students as well.

  • PDF

Design for Purchasing Process of Cyber Shopping Mall Using Object-Oriented Development Methodology (객체 지향 개발 방법론을 이용한 사이버 쇼핑몰 구매 프로세스 설계)

  • 박우용;허정준;김광섭
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.55
    • /
    • pp.107-116
    • /
    • 2000
  • Electronic Commerce is purchasing or sales a products and services to customers using computer network. It is different to traditional commerce. Also, It divide into business to business commerce and business to customer commerce. Cyber Shopping Mall is a representative type of business to customer commerce. The interest and demand of national business to customer commerce is explosively increasing with industry. It expect to reach 61 billion won in the 2000. Thus Structure of Cyber Shopping Mall is the more complex and the more vary types. It is the problem that change of established Cyber Shopping Mall structure is very difficult. The purpose of this study Is designed to Cyber Shopping Mall Purchase Process that deal with quickly changable internet environment and meet the needs of customers immediately using UML(Unified Modeling Language) in design phase determinant of Cyber Shopping Mal1 structure. Cyber Shopping Mall Purchase Process is designed to have objective-oriented development methodology's advantage. It has a flexibility in case of shopping mall structure change and acts as useful guideline in design phase of construction of Cyber Shopping Mall.

  • PDF

Cyber-Lecture Management System based on XML (XML 기반의 사이버 강좌관리 시스템)

  • Kim, Hye-Young;Kim, Hwa-Sun;Kim, Heung-Sik;Kim, Sang-Gyun;Choi, Heung-Kook
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.529-538
    • /
    • 2003
  • The speedy development of the world-wide web is rapidly growing the internet-based tools for the remote instruction. In interchanging and expressing the information of one another on the web, it is produced through the form of HTML(Hyoertext Text Markup Language). However, the structural disadvantage of the HTML is becoming to require a powerful XML(eXtensible Markup Language) which can store all the sphere of data, and transform them into another form. Nevertheless, because the powerful XML(eXtensible Markup Language). However necessary that XML standard should be applied appropriately. Because existing lecture data of cyber education sites cannot be shared, the users should passively use only the functions offered by cyber school. To solve the problem of this limit, in this study, the standardized data structure for XML is defined, and system model for processing between the server and the client is provided. By storing the lecture data of cyber education sites as XML on the web, stored data came to be reused without changing on any site. In the view of Users, they could used the Internet service with equipment that they want at any place and any time. To control any kinds of CK\LMS(Cyber Lecture Management System) for Administrator and Users, we offered a variety of Multimedia applications and an easy interface and built a new style of CLMS. Therefore, by strong and extracting the data related with the virtual education of the secondary school through the form of XML, for the effective interchange and sharing of the information, maximum utilization of the information can be achieved.

Study on Establishment of Internet ethics expressed through Language convert in computer games (컴퓨터 게임에서의 언어 표현변화를 통한 인터넷 윤리 확립에 관한 연구)

  • Park, Koo Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.47-52
    • /
    • 2012
  • Today the Internet is being used in all areas. However, part of everyday life, the lack of ethics on the Internet, the Internet lies in state. Especially the youth, should exploit the anonymity. As a result, has caused many problems. Fps online game from young people enjoy the use of profanity and slang, and increasing the damage of cyber violence has also increased. The damage type of cyber violence, abusive and slang, and the age, the lower the investigation was to increase the damage. Lot of publicity and public service advertising is in progress in order to prevent problems, but its expected effects is lacking. In addition, using abusive and slang words, This is a fundamental and provide a service to handle deleted or blinds, but if you can not see the solution. In this paper suggests the language convert that can be applied to Fps online games. Language the conversion process, if applicable to the game, the abusive and slang language, helps to purify. Proposed language the conversion process is expected to reduce cyber violence used abusive and slang.

Swearword Detection Method Considering Meaning of Words and Sentences (단어와 문장의 의미를 고려한 비속어 판별 방법)

  • Yi, Moung Ho;Lim, Myung Jin;Shin, Ju Hyun
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.98-106
    • /
    • 2020
  • Currently, as Internet users increase, the use of swearword is indiscriminately increasing. As a result, cyber violence among teenagers is increasing very seriously, and among them, cyber-language violence is the most serious. In order to eradicate cyber-language violence, research on detection of swearword has been conducted, but the method of detecting swearword by looking at the meaning of words and the flow of context is insufficient. Therefore,in this paper,we propose a method of detecting swearword using FastText model and LSTM model so that deliberately modified swearword and standard language can be accurately detected by looking at the flow of context.

Influence of Marriage Immigrants' Safety Education Attitude on Safety Awareness: Focusing on Mediating Effect of Korean Language Ability (결혼이민자의 안전교육 태도가 안전의식에 미치는 영향: 한국어능력의 매개효과를 중심으로)

  • Mi-Jung, Park;Sun-ah, Park
    • Journal of the Korea Safety Management & Science
    • /
    • v.24 no.4
    • /
    • pp.9-14
    • /
    • 2022
  • The purpose of this study is to verify the mediating effect of Korean language ability on the effect of marriage immigrants' safety education attitude on safety awareness. A survey was conducted on marriage immigrants living in the Daejeon and Chungcheong regions, and the responses of 109 people were used for the analysis. After controlling for gender, nationality, age, educational background, period of stay, region of residence, and presence or absence of safety accidents, the analysis was performed according to the step-by-step approach of Baron and Kenny(1986). In order to verify the statistical significance of the mediating effect of Korean proficiency, the Sobel test was conducted. As a result of the study, it was confirmed that marriage immigrants' safety education attitude had a significant positive (+) effect on safety awareness, and Korean language ability had a partial mediating effect on the relationship between marriage immigrants' safety education attitude and safety awareness.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.