• Title/Summary/Keyword: Cyber-University

Search Result 2,839, Processing Time 0.026 seconds

A Study on the Cyber Violence of Juvenile (청소년의 사이버 폭력에 관한 연구)

  • Lee, Ga Yun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.129-131
    • /
    • 2013
  • 본 논문에서는 정보화의 발전에 따라 사이버 공간에서의 청소년들의 사이버 폭력이 증가하고 있는 현실에 비추어 사이버 폭력의 개념과 유형을 알아보고 청소년들의 사이버 폭력의 발생 원인에 대해 청소년의 유일한 놀이문화로의 인터넷, 스트레스 해소, 청소년의 인정받고 싶은 욕구만족, 사이버 폭력에 대한 죄의식 결여로 나누어 간략히 살펴보고, 청소년의 사이버 폭력의 예방을 위한 대응방안에 대해 건전한 사이버 공간의 형성, 온라인서비스제공자(OSP)의 책임 강화, 사이버윤리교육 강화 등을 들어 보았다.

  • PDF

A Study on Information Literacy Evaluation Standard for Cyber Teacher (사이버 가정교사의 정보 활용능력 평가기준에 관한 연구)

  • Kim, Chul;Kim, Jeong-Rang;Park, Sun-Ju;Ma, Dai-Sung;Cheong, Eun-Ah
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.3
    • /
    • pp.383-391
    • /
    • 2009
  • The goal of cyber teaching is to reduce the cost of private lessons, dissipate the educational disparity amongst regions, make classes apt to the given level of every group of students, make up for systematic defects of the public education, and ultimately strengthen its role. This study intends to analyze the capabilities of cyber teachers and clarify their qualifications, as the whole new e-Learning system is about to take root. In this study, the activities of cyber teachers are analyzed and some standards of applicability of cyber teachers, or the so-called ISSCT, are presented. Firstly, the activities are divided into teaching, counselling, process management, development of professionality. Based upon these four activities, nine tasks have been formed and the structure of 22 sub-tasks has been completed. This is the way the standards of applicability of cyber teachers are established in consideration with their activities. Secondly, the standards of information capability of cyber teachers have 53 elements in total, and the aforementioned ISSCT are presented in relation to the ISST, based upon the standards of information capability of cyber teachers.

  • PDF

Cyber University records management system for remote testing automatic scoring open-ended research (사이버대학 성적관리를 위한 원격시험 주관식 자동채점 시스템 연구)

  • Park, Ki-Hong;Jang, Hae-Sook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.117-118
    • /
    • 2014
  • 정보통신기술, 멀티미디어 기술 및 관련 소프트웨어 등을 이용하여 형성된 가상의 공간(Cyber-Space)에서 교수자와 학습자 간의 수업이 이뤄지는 사이버대학에서 학생들의 성적관리를 위한 원격시험 주관식 시험문제 자동채점 시스템을 연구하였다.

  • PDF

A Six Sigma Cyber Training Program for Green Belt (그린벨트 양성을 위한 6시그마 사이버 교육)

  • Hong, Sung-Hoon;Choi, Young-Shik;Choi, Ik-Jun;Song, Jae-Woong;Kwon, Hyuck-Moo;Lee, Min-Koo
    • IE interfaces
    • /
    • v.17 no.3
    • /
    • pp.384-396
    • /
    • 2004
  • This paper is concerned with a six sigma green belt training program. Comparative studies of existing training programs for three major companies (Samsung Electronics Company, Hyundai Motor Company, and LG Chemical Ltd.) and two consulting firms (Korean Standards Association and Korea Management Association) are performed. Based on the comparative studies, a cyber green belt training program is developed. The training program, which is composed of 34 modules, follows a disciplined process of five macro phases: define, measure, analyze, improve, and control (DMAIC). This cyber training program is serviced in the homepage http://ise.chonbuk.ac.kr/∼sixsigma. It has been utilized as one semester subject of "Six Sigma Quality Management" in the department of industrial engineering. The advantage and disadvantage of this cyber training program are also discussed.

A substantial study on the Relationship between students' variables and dropout in Cyber University (사이버대학 학습자관련 변인과 중도탈락 간의 관계 규명을 위한 실증적 연구)

  • Im, Yeon-Wook
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.205-218
    • /
    • 2007
  • This study investigates the reasons of dropout in a survey of 348 dropouts from a cyber university located in Seoul, Korea. Most common reasons are time constraints due to work or family-related needs. Difficulties in adjusting to online learning environment and uncertainties regarding the value of a cyber university degree also played important roles. Drop-out students who pointed to these two reasons also suffered from lack of communication and interaction with other students and professors. Efforts to address these issues are in order as well as the development of time-efficient learning strategies and financial aids.

  • PDF

Moving Brand Identity in Cyber World (Cyber World의 Moving Brand Identity에 관한 연구)

  • Whang, Chris Inkyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.65-71
    • /
    • 2016
  • The cyber world is organically alive. It continues to evolve as humans interact with it. Real life and virtual reality are directly or indirectly connected through technology at the network terminal. Branding, in the cyber world, is created by BI(Brand Identity), using designed symbols and logotype developed with digital technology. The objective of this study is to improve the brand value of enterprises and organizations through the use of moving images to adapt to the mobile environment in this rapidly changing cyber world. First, the basic concepts of brand identity, structure, and integrated brand identity were studied. Next, case studies of overseas enterprise branding such Swisscom, HP, BBC were analyzed examining their design concepts and implementation of integrated moving brands. Finally, moving brand identity is explored, for value enhancement, in my projects in ACM SIG CHI 2015, HCI Korea 2014, Aegis Ship 'Yulgok YiYi.' with a discussion of design planning and results. This treatise will contribute to the improvement of brand strategy and design in this country.

Economic Analysis on Effects of Cyber Information Security in Korea: Focused on Estimation of National Loss (사이버정보보호의 경제적 효과분석: 국가적 피해액 산정을 중심으로)

  • Shin, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.89-96
    • /
    • 2013
  • Recent DDoS attacks and private informations leaked show that everyday life is interwoven with cyberspace and we are becoming more vulnerable to cyber attacks. Therefore, a systematic understanding of cyber damage structure is very important and damage loss estimation method should be developed to establish solid cyber security protection system. In this study, economic loss caused by cyber attacks are surveyed based on the analysis of existing studies and try to develop a reasonable methods to estimate economic effects of cyber security protection in Korea. Potential economic loss of Korea by cyber attacks may be situated between 10 billion and 40 billion dollars. But more sophisticated system should be established to estimate economic effects of cyber protection for proper policy decision making.

Development of Cyber Lecture Contents and Application to the Basic Neuroscience Integrative Lecture for Medical Students (기초의학 통합강의 운영을 위한 가상강의(Cyber Lecture)의 개발 및 적용 -기초신경과학 통합강의의 운용과 설문을 통한 학생들의 의견을 중심으로-)

  • Park, Jeong-Hyun;Park, Kyeong-Han;Lee, Young-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2222-2229
    • /
    • 2011
  • The purpose of this study was to evaluate the efficacy of basic integrative lecture course of medical college through cyber lecture. This study was also aimed to develop and implement a progressive cyber-teaching method which integrative lecture system is concerned for medical students. In this study, effectiveness of cyber lecture on the student's satisfaction, content difficulty and course management were analyzed by way of anonymous survey at the end of basic neuroscience integrative lecture course. Survey data were also analyzed with statistical tools to find out strength of correlation between students degree of satisfaction to cyber lecture and their individual grade of this course. The majority of students held positive opinions on course management, level of difficulty in each session, utilizing multimedia contents and preferred cyber lecture system to be continued in the future. Many students also suggested intimate integration of multimedia contents shown in cyber lecture to the lab sessions for the maximization of educational effect. In this study, it suggested that cyber lecture could be a useful tool in teaching integrative medical subjects and play more important role in the future integrative medical subjects with the improvement of present problems and limitations.

An Integrated Test of Interaction Effect between Causes and Internet Ethics of Smart Phone Cyber Bullying (스마트폰 이용에서 사이버폭력의 그 원인들 및 인터넷윤리의 통제효과에 대한 통합적 검증 연구)

  • Jang, Ha-Young;Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.46-61
    • /
    • 2019
  • This study constructs an integrated model for university students' smart phone cyber bullying and tests interaction effects between causal and control factors. Causal factors include low self-control, differential association with cyber bullying peers, and victimization experiences; and control factors include internet ethics, perceived certainty of formal punishment, and bond to parents. This study focuses on examining how internet ethics buffers the effect of causal factors in cyber bullying. Results show that both differential association with cyber bullying peers and victimization experiences have significant effects on cyber bullying. And among the control factors, internet ethics only has a negative direct effect on cyber bullying. In addition, it is found that there are significant interaction effects between two causal factors - differential association with cyber bullying peers and victimization experiences - and internet ethics. It is also shown that there is a significant interaction effect between victimization experience and bond to parents, but a perceived formal punishment has no significant control effect. It is revealed that internet ethics is a main control factor in buffering the effects of causal factors in cyber bullying.