• Title/Summary/Keyword: Cyber-education

Search Result 869, Processing Time 0.026 seconds

Local Autonomy and Training of public Librarians (지방자치와 사서직 공무원 연수)

  • Lee, Myoung-Gyu
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.3
    • /
    • pp.311-330
    • /
    • 2002
  • A public librarian is an occupation, which requires long-term. continuous training and difficult study to acquire and cultivate professional knowledge and skills. It is a necessity to achieve new knowledge, information and skills via appropriate retraining. A training system is the method which gives chances of retraining to public librarians. After examining some of the problems with the existing training system, it is apparent that the direction of training system needs to be decentralized. That is each local branch should be autonomous in terms of new training for librarians. For the method of training system, each autonomous unit would integrate the different theories to apply to the community-at-large and invite practical specialists from the local community to lecture. The training classes would be elective in that the each librarian could choose the classes he/she wants to take and give them credits for that, but the certificate for the class would also go towards completion for the required technical training. Finally, the utilization of cyber-education should be introduced, and the library association's role strengthened, to help public librarians cultivate their specialties.

A Study of Information Leakage Prevention through Certified Authentication in Phishing, Vishing, SMiShing Attacks (Phishing, Vishing, SMiShing 공격에서 공인인증을 통한 정보침해 방지 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.171-180
    • /
    • 2007
  • The financial crime that used morale anger Phishing, Pharming, Vishing, SMiSing etc. will gain during recent cyber crimes. We are study systematically whether or not leakage of information and infringement can how easily occur to Phishing, Vishing, SMiSing using a social engineering technique and VoIP at these papers through experiment. A hacker makes Phishing, Vishing site, and test an information infringement process of a user through PiSing mail and a virus, a nasty code, Vishing, a SMiSing character, disarmament of Keylogger prevention S/W etc. as establish server. Information by Phishing, Vishing, SMiSing is infringed with leakage in the experiment results, and confirm, and test certified certificate and White List and a certified authentication mark, plug-in program installation etc. to prevention, and security becomes, and demonstrate. Technical experiment and prevention regarding Phishing of this paper and Vishing attack reduce the damage of information infringement, and be education for Ubiquitous information security will contribute in technical development.

  • PDF

A Rogue AP Detection Method Based on DHCP Snooping (DHCP 스누핑 기반의 비인가 AP 탐지 기법)

  • Park, Seungchul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.11-18
    • /
    • 2016
  • Accessing unauthorized rogue APs in WiFi environments is a very dangerous behavior which may lead WiFi users to be exposed to the various cyber attacks such as sniffing, phishing, and pharming attacks. Therefore, prompt and precise detection of rogue APs and properly alarming to the corresponding users has become one of most essential requirements for the WiFi security. This paper proposes a new rogue AP detection method which is mainly using the installation information of authorized APs and the DHCP snooping information of the corresponding switches. The proposed method detects rogue APs promptly and precisely, and notify in realtime to the corresponding users. Since the proposed method is simple and does not require any special devices, it is very cost-effective comparing to the wireless intrusion prevention systems which are normally based on a number of detection sensors and servers. And it is highly precise and prompt in rogue AP detection and flexible in deployment comparing to the existing rogue AP detection methods based on the timing information, location information, and white list information.

Mediating Effects of Help-Seeking and Concealment on the Relations between Perfectionism and Depression, Anxiety in University Students (대학생을 대상으로 한 완벽주의와 우울 및 불안의 관계에서 학업도움추구와 은폐의 매개효과)

  • Jung, Eun-Sun;Ha, Jung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.671-681
    • /
    • 2016
  • The purpose of this study is to investigate the role of help-seeking and concealment in the relationship between perfectionism, depression, and anxiety. The participants were 252 university students, and analyses were conducted using PASW 18.0 and Amos 8.0. Help-seeking was confirmed to be a mediating variable between self-oriented perfectionism, depression, and anxiety. That is, self-oriented perfectionism had an effect on depression and anxiety through help-seeking. Also, concealment was a partially mediating variable between socially prescribed perfectionism, depression, and anxiety. The need to develop counseling and education approaches as a special intervention is discussed. The approaches are meant to reduce socially prescribed perfectionism and concealment. Limitations and implications for further study are suggested.

The Effects of Health Department Undergraduates' Self-efficacy on Stress-coping Strategies : Focusing on multiple group analysis by grade and sex (건강보건 대학생의 자기효능감이 스트레스 대처전략에 미치는 영향 : 학년과 성별의 다중집단분석을 중심으로)

  • Baek, Yu-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.8
    • /
    • pp.5273-5281
    • /
    • 2015
  • The purpose of this study is to examine the effects of health related departments' self-efficacy on stress-coping strategies by setting up grade and sex as regulating variables and figure out their mediating effects. To attain the goal, a survey was conducted to 1,442 undergraduates attending S University, and the results went through analysis by using SPSS and AMOS. To sum up the study results, preference of difficult project exerted negative effects on avoidance-centeredness. Self confidence had negative effects on avoidance-centeredness. Self-regulating efficacy indicated positive effects on social support-orientation and problem solving-centeredness while avoidance-centeredness showed negative effects. Regarding effects among self-efficacy's subfactors, confidence, self-regulating efficacy, and preference for task difficulty, and stress-coping strategies' subfactors, social support-orientation, problem solving-centeredness, and avoidance-centeredness, there was difference found in the model by grade, but there was no difference found by sex.

Real-time Audio Watermarking System Considering Audio Source and User (음원 및 사용자를 고려한 실시간 오디오 워터마킹 시스템)

  • Cho, Jung-Won;Jeong, Seung-Do
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3213-3217
    • /
    • 2009
  • Distribution, duplication and manipulation of the digital contents are very easy due to the characteristics of the digital contents. Thus, damages of invasion of property right rapidly increase due to infringement of copyright for the digital contents. To prevent illegal use and to settle conflict about ownership of the digital contents, continuous efforts with enormous expense are devoted. In this paper, we design and implement real-time audio watermarking system to protect ownership and copyright for the digital contents. The proposed system also clarifies where the responsibility about the illegal distribution lies. The system has convenient user interface so that general administrator without an expert knowledge of the protection of copyright can use easily. In addition, unlike the traditional watermarking system, our system has merit to offer information about the illegal distribution for clear post-management.

A Comparison on Major Curriculum of 2-Year, 3-Year, and 4-Year Health Administration Colleges in Korea (국내 보건행정(학)과의 학제별 전공교육과정 비교분석 연구)

  • Hwang, Chung-Il;Hwang, Jeonghae
    • Health Policy and Management
    • /
    • v.23 no.3
    • /
    • pp.224-232
    • /
    • 2013
  • Background: This study was a comparative analysis of the major curriculum for 2-year, 3-year, and 4-year colleges of the department of health administration in Korea. Methods: Among 45 Korean colleges registered with the department of health administration as of 2012, finally 25 colleges were selected by establishing the department of health administration more than 5 years ago, excluding government's financial support, and taking regional locations into account. Results: First, generally 2-year colleges was not the relationships between organizational philosophy/purposes and major course in comparison to those of 3-year or 4-year colleges. Second, the composition of credits in the major course appears to be higher for 3-year, 2-year, and 4-year colleges, respectively. Third, subjects related to basic medicine and medical records were included more often in 2-year, 3-year, and 4-year colleges, respectively, and health policy issues were covered more in 4-year, 3-year, and 2-year colleges, respectively. Fourth, the number of students per full-time professor in 2-year colleges was much higher than that in 3-year and 4-year colleges, and the employment rate of graduates for 4-year colleges was found to be higher than that for 2-year and 3-year colleges. Conclusion: Although this study has limitations with regard to the selection of research subjects, it provides baseline data for establishing the health administration required for training competent future professionals.

Factors Affecting on Saving Behaviors, Perceptions of Economic Situation and Attitudes on the Program of the Asset-based Program Participants (저소득층 자산형성사업 참여자의 저축행위와 경제상황에 대한 인식, 사업에 대한 태도에 영향을 미치는 원인에 관한 연구)

  • Kim, Hyeyoun
    • Korean Journal of Social Welfare
    • /
    • v.66 no.1
    • /
    • pp.35-59
    • /
    • 2014
  • The purpose of this study is to investigate determinants of the saving behaviors, perceptions of economic situation and attitudes on the program of the Individual Development Account program participants in Korea. Data used for this article was the survey on the participants of 'Seoul Hope-plus Saving Account Program' implemented by Seoul Welfare Foundation for 3 years. In order to consider variances within-individual and between-individuals, Hierarchical Linear model is used for this study. The results are as follows. First, In demographic factors, disability, gender, education level, marriage status are significant factors on the effectiveness of the program. Second, the participation on the program has positive effects on the conception on the living standard and economic status of the participants. However, total amount of savings excluding savings on 'Hope plus' has decreased. The household income is positively related with the amount of savings. Thus, it is necessary to consider individuals' socio-demographic factors to planning the asset-based program.

  • PDF

A Case Study of Recent New Terrorism and Potential Patterns in South Korea (최근 국외 뉴테러리즘의 사례분석과 국내 발생가능 유형에 대한 연구)

  • Jeon, Yong-Jae;Lee, Chang-Bae;Lee, Seung-Hyun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.11-33
    • /
    • 2017
  • Terrorism has existed in the entire human history and has become a significant topic in criminology while prior studies has focused on North Korea as the perpetrator, and this prevents an in-depth discussion of the international trends of terrorism. As soft targets are the main target of new terrorism and because we never ignore the significance of the consequences, there are needs for more studies on the topic. This study conducted a case study of major terrorism attacks and surveyed professionals in the field via an AHP analysis in order to find the characteristics of terrorism and its potential patterns in South Korea. As a result, we found that North Korea or the left-wing may utilize homemade bomb, motor vehicle or drone for the purpose of attacking multi-use facilities in South Korea. For policy implications, we insist developing a better CPTED approach on those facilities, improving professionalism of cyber-watchdog via more training and education, stricter control on drone permit, and operation of counseling centers for preventing radicalization.

  • PDF

Admission Consultation Wizard System Based on Multi-Agent (멀티 에이전트 기반의 진학 상담 위저드 시스템)

  • Lee Kwang-Jae;Choi Dong-Oun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.109-119
    • /
    • 2005
  • The Internet is widely used by general people and the use of Internet is spread to all industrial fields. Especially, cyber education fields have been changed a lot with the Internet application development. One of them is the field of consultation for university admission. As for the business of university admission, there were two ways applicants handed in their applications directly to school which they applied to and to each place to receive applications or sent them through FAX. Recently, highlighted is the Internet environment to receive the application for admission which integrated organically the two ways. In this thesis, I designed and implemented on-line admission consulting system using of multi-agent. The examines can apply for safely and according to their conviction by recommending the university course suitable for their academic aptitude and scores with test KSAT(Scholastic Aptitude Test Administered by the Korean Ministry) and a university grade report on students' record using intelligent multi-agents and through a university course recommending wizard in the process of choosing it.

  • PDF