• Title/Summary/Keyword: Cyber university

Search Result 2,814, Processing Time 0.026 seconds

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies (공공·행정기관 모바일전자고지서비스의 기술적인 안전성 확보 방안에 대한 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.7-16
    • /
    • 2020
  • The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.

The Effect of the Cognitive Thinking Trait between Counselor and Client on the Intimacy, Empathy, and Communication Level in the Military Counseling Process (또래상담병을 대상으로 상담자-내담자의 인지사고 특성이 친밀감, 공감, 소통 수준에 미치는 영향)

  • Lee, Jung Won
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.47-57
    • /
    • 2017
  • The purpose of this study was to investigate the difference of counselor-client's intimacy, empathy, and communication level when cognitive thinking trait between counselor and client is the same or not. For this purpose, 70 peer counselors of the S division conducted counseling training for 10 hours with 6 hours of education and 4 hours of practice. All counseling sessions were preceded by APL cognitive test, divided into two cognitive trait, followed by counseling with the same cognitive trait for two hours, and with a different cognitive for two hours. After each session, questionnaires were conducted. The results of this study showed that intimacy, empathy and communication level were significantly higher in counseling with the same trait as counselors than different. The results of this study are verifying the difference of the cognitive trait of the counselor and the client among the variables of the counselors influencing effect in the counseling process. Suggesting the importance of a counseling plan that takes into account the self-understanding of counselor and the trait of the client. Finally, the points of this study were discussed.

Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network (인지무선네트워크를 위한 회전자 기반 적응형 보안프레임워크 설계)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.165-172
    • /
    • 2013
  • Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. Especially, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio (CR) is a convergence technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. The main purpose of this research is focused on devising an adaptive security framework based on carousel for CR networks as a distinct telecommunication convergence application, which are still at the stage of being developed and standardized with the lack of security concerns. The framework uses a secure credential, named as carousel, initialized with the location related information from objects position, which is used to design security mechanisms for supporting privacy and various securities based on it. The proposed adaptive security framework could be used as a security building block for the CR network standards and various convergence applications.

A exploratory study for Influential factors of smartphone over-dependence in elder and older Group (장·노년층의 스마트폰 과의존 영향요인에 대한 탐색적 연구)

  • Bae, Sung-Man;Koh, Young-Sam
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.111-121
    • /
    • 2017
  • Smartphone use has become a part of everyday life, not only for adolescents but also for elderly and older people. Thus, this study explored the effect of demographic variables, the amount of smartphone usage, type of smartphone use and psychosocial variables on smartphone dependence of the elder group. We analyzed the data of 5627 (50s and 60s) of the Internet overdependence survey data of the Korea Information Society Agency in 2016. As a result of hierarchical multiple regression analysis, More frequency of smartphone use of weekday and weekend, and usage time of smartphone of weekday were related to greater smartphone dependence. More smartphone use for information seeking and games were associated with greater smartphone dependence. And, as loneliness and anxiety increased, smartphone dependence increased, while smartphone dependence decreased, as social capital increased. Through this study, it is necessary to understand characteristics related to smartphone dependence of elder and older group, and to use this knowledge to solve their smartphone dependence. Future studies also need to identify the causal relationship between predictors of smartphone dependence in elderly and older people.

The Impact of Spiritual Commitment, Social Support and Self-esteem on Deviant Behavior of Middle-aged Man (중년기 남성의 영성지향도, 사회적 지지, 자아존중감이 일탈행동에 미치는 영향)

  • Ko, Ki-Sook
    • Korean Journal of Social Welfare
    • /
    • v.57 no.4
    • /
    • pp.197-223
    • /
    • 2005
  • The purpose of this study is to examine the impact of spiritual commitment, social support and self-esteem for the deviant behaviors of middle-aged men from 40 to 59 years old. Further, this study seeks for providing basic data for designing social welfare service programs to intervene and prevent such deviant behaviors The findings of this study can be summarized as follows: The relationship among variables are as follows. First, spiritual commitment could directly affect the mid-life deviant behavior, and could cause influence indirectly through the self-esteem. Second, social support could not directly affect the mid-life deviant behavior, but could cause negative influence indirectly through the self-esteem. The significant is that this study triggered off interest in deviant behavior of middle-aged men. Especially, this study realized to us interest in spiritual commitment which has been not interested in the social work. This implicated that social support and self-esteem might effect to be deviant behavior of middle-aged men as well as deviant behavior of youth.

  • PDF

Design of the Copyright Protection for ePub e-Book System using Certification Information (인증 정보를 이용한 전자책 ePub의 저작권 보호 시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2197-2204
    • /
    • 2015
  • In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses. This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.

Measuring the Effectiveness of Teaching and Actual Condition of Internet Ethics of the Undergraduate Students (인터넷 윤리의식의 실태 분석 및 교육 효과 측정)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1257-1269
    • /
    • 2010
  • The internet which is fast spread over all areas of our lives provides us with benefits of efficiency, productivity, and amusement; however, its features as an anonymous and non-face-to-face medium have raised a serious social issue of the collapse of internet ethics due to the abuse of it. Thereupon, the importance of internet ethics education has been highlighted to prevent side effects resulted from the internet and cultivate human-centered internet culture. In this paper, we suggests desirable methods for internet ethics education based on the investigation and analysis of the status of university freshmen's internet ethics. This research conducted a survey and analyzed its result after categorizing the status of internet ethics into the invasion of private information, invasion of intellectual property rights, harmful information, internet communication culture, cyber violence, internet addiction, and internet fraud. And based on the result of analyzing their internet ethics, this paper suggests desirable methods for internet ethics education. Next, internet ethics education was conducted by applying the proposed methods for internet ethics education, and its educational effect was evaluated. According to the result of verifying the educational effect measured statistically, it has proved that the suggested internet ethics education is effective to improve undergraduates' internet ethics.

A Meta-analysis of The Factors Related to Bullying Damage Experience of Adolescent (청소년의 집단따돌림 피해경험과 관련된 요인에 대한 메타분석)

  • Moon, Dong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.685-697
    • /
    • 2020
  • This study conducts meta-analysis of the effect size of related factors using research papers published within the past 20 years in relation to adolescent bullying experience in Korea. The verification results are as follows. First, in inducing factors, the overall effect size, personal psychology factor, and school life factor group showed a medium effect size. In the causative factors, the aggression, anxiety, stress, depression, suicidal thoughts, and school stress of school psychological factors showed a moderate effect size. Second, in terms of deterrent, the overall effect size, family environment factor, personal psychology factor, and school life factor group showed a medium effect size. In the sub-factors of determinants, the parenting attitude, parental support, and self-esteem and self-resilience of the family environmental factor group also showed a medium effect size. In conclusion, this study is meaningful in that it tried to quantitatively integrate the previous studies to examine objective results. It is meaningful that it provided basic data in program development and policy making to prevent and reduce the bullying of youth.

Diadochokinetic Skills in Typically developing Children Aged 4-6 Years : Pilot Study (학령전기 정상발달 아동의 자모음 교대운동특성 : 예비연구)

  • Jeong, Han-Jin;Lee, Ok-Bun;Sehr, Kyeung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3149-3155
    • /
    • 2011
  • The purpose of this study was to know the characteristics of DDK performance between CV(e.g. 'pa') and VV(e.g., 'ai') syllables in typically developing children aged 4 to 6 years old. 12 TD children performed DDK with CV structure(/pʰə/, /tʰə/, /kʰə/, /pʰətʰə/, /tʰəkʰə?/, /pʰətʰəkʰə/) and with VV structure(/ai/, /ɔi/, /ɑɔi/). Spoken syllables were counted in one second, and all spoken DDK were measured by PC-quirer. The results showed that all spoken DDK became faster as the age of children were increased. This trend was also appeared in both CV and VV syllables repetition. In addition, there was no differences in DDK rate with CV and VV syllables. The frequency of articulatory error during DDK performance was very high in the age of 3, and there was no pattern in the frequency of articulatory error according to the developmental age.

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.