• Title/Summary/Keyword: Cyber-University

Search Result 2,856, Processing Time 0.031 seconds

A Study on the Model of Cyber Elementary School (사이버초등학교 모형에 관한 연구)

  • Kim, Jeong-Rang
    • Journal of The Korean Association of Information Education
    • /
    • v.8 no.3
    • /
    • pp.385-394
    • /
    • 2004
  • The process for the information society centered on the internet supplied us a space of another life, cyber space. In the reality that the cyber space exercised its influence on the our society outstandingly, this researcher think that it needs to have to discuss about the cyber school in the elementary schools by making use of experience the soft landing of cyber university. This study suggested the model of cyber elementary school applicable to the elementary schools, and discussed with the operational plan by the model. Also, it examined the field teachers' opinions about the model classification and operation through the questionnaire, and analyzed the result. It was divided into the four sorts of cyber elementary schools like the school support type, school associated type, and independent type, and transitional period type. This study researched the concept by the model each, the object and purpose of major education, the operational system, curriculum and contents. As a result of collecting their opinions through the questionnaire, it is desirable to be operated as the transitional period type and the school support type in case of the introduction of cyber elementary schools in the present elementary schools.

  • PDF

Strategic Decision Making Model Among Collective Intelligences Using The Game Theory in Cyber Attacks - Case study of KHNP Hacking - (사이버공격시 게임이론을 활용한 집단지성간 전략결정 모델 연구 - 한수원 해킹사건을 중심으로 -)

  • Park, Sang-min;Lee, Kyung-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.237-246
    • /
    • 2016
  • Recently various types of cyber attacks have occurred. The strategic goals & tactical means of these have evolved. Especially KHNP cyber attack was the type of hacktivism combined hack and psychological warfare. The cyber attackers have forecd the nation to participate in the cyber warfare and the government to make strategic decisions to the releases of confidential information and the threats of stopping KHNP. In this paper, we would like to study the effective strategic decision-making model utilizing the game theory and including an attack intelligence on open policy Decision framework.

The effect of educational participatory motivation and life satisfaction on major satisfaction among Cyber University students (사이버대학생의 학습참여동기와 삶에 대한 만족도가 전공만족도에 미치는 영향)

  • Gwak, Yoon Jung;Lee, Ji Hye
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.285-295
    • /
    • 2018
  • This study examined the effects of Cyber University students' educational participatory motivation and life satisfaction on their satisfaction with their major. The subjects were 937 adult learners at one of the Cyber Universities in Seoul, Korea, who were over 20 years of age. The results were as follows. First, the main motivation of the Cyber University students was goal-oriented, followed by learning-oriented motivation and activity-oriented motivation. Second, there were significant differences in their educational participatory motivation, life satisfaction and major satisfaction according to their sex, age, occupation, marriage and major. Third, their life satisfaction and three types of educational participatory motivation had positive effects on the satisfaction with their major in the order of life satisfaction, goal-oriented motivation, learning-oriented motivation and activity-oriented motivation. These findings suggest that adult learners' quality of life and motivation to learn are very important for increasing the degree of satisfaction with their major.

A Study on the Characteristics of Students and Educational Needs for Construction Education in Cyber University (사이버대학 건설 전공의 입학생 특성과 교육 수요 분석)

  • Bae, Yoonsun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.4
    • /
    • pp.739-746
    • /
    • 2017
  • The need for education that meets the strengths and weaknesses of cyber education is raised because there is difference in the characteristics of students and the needs for education between the cyber university, where the education without constraints of time and space is made, and the existing offline universities. Also, it is expected that the satisfaction of students will be greater if the education is provided based on the analysis of the characteristics of students and their demands for education. There are many students already engaged in construction industry. The students entering the construction engineering department in cyber university are Interested in acquiring the theoretical foundation and professional construction knowledge based on practical experience, professional licenses, and career management. Also, they are interested in further studies at graduate school level and add to academic depth. This study suggests the necessity of establishment of construction education system Including objectives and curriculum in cyber university based on the analysis on the characteristics of students and educational needs.

NCS based Leveled Micro-Degree Certification Model for Training Practical Cyber Security Experts

  • Kim, Jeong-Sham;Lee, Kyu-Chang;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.123-133
    • /
    • 2022
  • In this paper, we propose a Leveled Micro-Degree Job Competency Certification Model that considers the level of the job based on the job defined in the NCS. There is a mismatch of manpower due to the problem of university education that cannot keep up with the rapidly changing technological environment caused by the 4th Industrial Revolution. The Nano-Degree and Micro-Degree systems designed to solve this problem are used for job competency certification of cyber security personnel. NCS sub-categorized job field is defined as Micro-Degree and detailed job by ability unit is defined as Nano-Degree, the level of the ability unit defined by level is equally applied to the Micro-Degree. And it is a system that certifies the job competency corresponding to the degree-based university academic background. By applying this system to the curriculum of Cyber Security School, Yeungnam University College, we proposed a method to configure the Nano-Degree course based on NCS duties. The method proposed in this paper can be used as a method for verifying job competency of Nano-Degree and Micro-Degree, which are recently introduced by many universities.

Perception of Science High School Teachers on Cyber Education (사이버 교육에 대한 과학고 교사의 인식 조사)

  • Lee, Jaeho;Chun, Miran;Jin, Sukun
    • Journal of Gifted/Talented Education
    • /
    • v.26 no.4
    • /
    • pp.635-652
    • /
    • 2016
  • This study investigated operation plan for the Cyber Bridge Program based on the survey from teachers of science high schools. Teachers were found to be thinking it positive that cyber programs can be operated free from the time and spatial restrictions. They thought that teacher interactions are hard to occur and teachers' role in learning is limited as well. Also, the geographical, physical, and socio cultural minorities might have benefits from cyber programs either as regular programs or the before entrance programs. Therefore, the detailed plans are needed. Most of all, since the educational contents are the key for the programs, we suggested some contents categories and developmental criteria. As a result, the developments of high quality contents and financial supports for the successful Cyber Bridge Program are essential.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

A Study on Cyber Punk Fashion Expressed in the Movies (영화에 표현된 사이버 펑크패션에 관한 연구)

  • Jung Yeoun-Ja
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.7 no.3
    • /
    • pp.181-188
    • /
    • 2005
  • This study attempted to investigate the plastic characteristics of cyber punk fashion with a focus on fashion in the cyber punk movies in order to inquire into how the influence of the cyber punk taking the lead in the spiritual culture and way of life of the humankind in the 21th century would be expressed in fashion. For this purpose, it sought to analyze the beauty of new fashion creating the cyber environment and identify its contemporary meaning. An attempt was made to investigate the image of cyber punk fashion with a focus on fashion expressed in the cyber punk movies. As a result, the following findings were obtained: First, the image of cyber punk fashion expressed in the cyber punk movies was simplicity, which was to express the modest silhouette and details exclusive of decoration. In addition to clean and smooth gloss, it contained the modest image of resistance', not 'revolt' by borrowing the partial motive and image from existing punk fashion. The change of cyber punk fashion into the characteristic of concise, smooth external appearance brought about the restraint of its image and symbolism as well as its plastic characteristic. Second, it was characterized by the Eroticism nature of emphasizing the body line while expressing the future and modest image or exposing the body. Cyber punk fashion expressed the avant-garde image by using materials that gave a mysterious and future feelings, as well as unsymmetrical silhouette, the slit of body-conscious line, coarse cutting, the method of do-constructing and reconstructing the silhouette, the method of applying diverse underwears such as corset, brassiere and the like. Third, cyber punk fashion was marked by the nature of mined sex. It had the masculine image by using the black color containing the image of masculinity and resistance in female clothing and expressing the suit, coat and military looks giving an masculine impression. And it expressed the image of mixed sexes with the masculine image in male clothing by borrowing feminine images such as body-conscious line, widely cut neckline, floral decoration, leggings and the like. Fourth, cyber punk fashion was marked by naturalness. It was expressed as clothing made from silhouette, knit, cotton and the like in the atmosphere expressing love, comfortableness and truth. This contained the image of naturalness, a return to the primitive, that human being wanted to return to their original figure in the future element. The cyber punk movie may contain a dismal, gloomy future image on the whole, which can be overcome, and shows the possibility that it may grow into the alternative culture, not the revolting culture. The movie of 'The Fifth Element' demonstrates the meaning and role that shows the bright future image. It is thought that designers should make efforts for cyber punk fashion to perform its role in changing the gloomy future image into the bright image of society

  • PDF

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

Methodology of Cyber Security Assessment in the Smart Grid

  • Woo, Pil Sung;Kim, Balho H.
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.495-501
    • /
    • 2017
  • The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS) and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system. Through OPF and Power Flow Tracing based analysis, the physical and economic impacts from potential cyber threats are assessed, and thereby the quantitative risks are measured in a monetary unit.