• Title/Summary/Keyword: Digital Certification

Search Result 208, Processing Time 0.024 seconds

Trend Analysis of Sport Pedagogy Sub-Domain in Secondary Teacher Certification Examination (체육 중등교사 임용시험의 교과교육학 하위영역에 대한 출제경향 분석)

  • Cho, Ki-Bum;kim, Seung-Yong
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.339-347
    • /
    • 2021
  • The purpose was to analyze the trend of sport pedagogy in secondary teacher certification examination based on the secondary teacher qualification criterion in Korea Institute for Curriculum and Evaluation since abolition of multiple-choice questions from 2014 to 2020. The result showed the questions for sport pedagogy were 48 question since 2014, and found 83 sub-questions. The implications are as follows. First, the frequency of sub-questions in sport pedagogy has increased, causing an integrated question. Second, the serious unbalanced issue of questions for examination was presented. Third, dependence on specific domains was excessively high. Fourth, the confusion caused by the overlapped domains with the content knowledge of physical education subject was intensified. Therefore, evaluation factors based on 2016 KICE classification table should be clear and field application questions should be developed.

The Influence of Hairdresser National Technology Certification Practical Tasks on Hair Designers' Job Attitude (미용사 헤어 국가기술 자격증 실기과제가 헤어디자이너의 직무 태도에 미치는 영향)

  • Oh., J.S;Park., J.S
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.819-825
    • /
    • 2022
  • As the importance of national technical qualifications for hairdressers to verify qualifications and skills as a professional is increasing, it is time to improve achievement motivation and job attitudes through research on job attitudes perceived by hair designers toward hair practical tasks. As a result of studying the effect on the job attitude of a hairstylist working in a hair salon, it was found that blow-drying induced the hairstylist's job efficacy among the practical tasks for the hairdresser's hair national technology certification, and scalp scaling and shampoo were the job of the hairstylist. was found to induce satisfaction. Based on the research results, it is possible to present a variety of practical certification tasks with practicality that can be usefully applied to customers in various techniques in the beauty industry, rather than unrealistic practical techniques limited only to wigs. We want to induce improvement. In addition, I believe that this study will provide basic data for the development of various practical tasks to improve the achievement motivation of hair designers.

A Study on the Technical Evaluation of the Quality Certification for e-Learning Contents (이러닝 콘텐츠 품질인증 기술성 평가기준에 관한 연구)

  • Han, Tae In
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.49-66
    • /
    • 2015
  • The increase of social interest for the e-Learning industry leads to the increase of e-learning contents and the system providers which are targeted at private education companies and public institutions. As the e-Learning is used in various areas, the evaluation for evaluation criteria and suitability are needed to provide a high-quality service and reliability. Previous works suggested the evaluation criteria for quality certification, however, the technical evaluation criteria are not provided. In this paper, we suggest the technical evaluation criteria for quality certification of e-Learning contents and describe the detailed features. Through the proposed work, we can establish the technical evaluation criteria and suggest detailed evaluation items for them by providing examples. It is expected that the proposed study is able to be utilized in e-Learning industry, if the policy is reflected and notified according to the feedback of the results of the trial service.

A Study of the Improvement Method of I-pin Mass Illegal Issue Accident (아이핀 대량 부정발급 사고에 대한 개선방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.11-22
    • /
    • 2015
  • The almost of Web page has been gathered the personal information(Korean resident registration number, name, cell-phone number, home telephone number, E-mail address, home address, etc.) using the membership and log-in. The all most user of Web page are concerned for gathering of the personal information. I-pin is the alternative means of resident registration number and has been used during the last ten-year period in the internet. The accident of I-pin mass illegal issue was happened by hacker at February, 2015. In this paper, we analysis the problems of I-pin system about I-pin mass illegal issue accident and propose a improvement method of it. First, I-pin issue must be processed by the off-line of face certification in spite of user's inconvenience. Second, I-pin use must be made up through second certification of password or OTP. The third, the notification of I-pin use must be sent to the user by the text messaging service of cell-phone or the E-mail. The forth, I-pin must be used an alternative means of Korean resident registration number in Internet. The methods can reduce the problems of I-pin system.

Analysis of Evaluation Requirement for CC and CEM (CC와 CEM의 평가요구사항 분석)

  • Kang Yeon-Hee;Bang Young-Hwan;Choi Sung-Ja;Lee Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.5 no.2
    • /
    • pp.95-100
    • /
    • 2004
  • For improve level of information security, the necessity of evaluation and certification of Information Security System(ISS) in increasing. Evalustion and Certification Institute have evaluated ISS for risk prevention of information dysfunction in an advanced countries. But, the problem of the time and cost occurred when it is caused by with application of unlike evaluation criteria each other. The result of effort to solution, Common Criteria(CC) and Common Evaluation Methodology(CEM) is using for evaluation of ISS and mutual recognition. Evaluation participant is needed flexible and active interpretation of CC and CEM for an efficient evaluation preparation and performance.

  • PDF

A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

Design and Implementation of Digital Jikin using Smartphone Application

  • Hong, Daewon;Kang, Miju;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.87-94
    • /
    • 2017
  • Due to the recent advances of IT industry, many companies and institutions have been used electronic documents rather than original paper copies. However, the characteristic of electronic document allows it to be readily damaged from proscribed copying, counterfeit, and falsification. These can cause the serious security problems for electronic documents. Conventional security methods for digital documents involve adding a separated image or marker, but these methods can reduce the readability of document. Therefore, we proposed a digital Jikin (Korean traditional stamp) which is normally used to identify the source or author of a document in asia. The proposed digital Jikin can preserve the readability of electronic document while protecting the document from proscribed copying, counterfeit, or falsification using image processing approach. In this paper, a digital Jikin application is designed and implemented under android platform and it converts the critical information of document onto the digital Jikin. The proposed digital Jikin contains important information in the boundary of Jikin not only about the author of documents or source, but also keywords, number of images, and many more. Therefore, the authenticity of document or whether the document has been altered or not by other person can be evaluated by the server. The proposed digital Jikin can be sent to a server through the wireless networks and can be stored using PHP and MySQL. We believe that the proposed method can offer the better and simple solution for strengthening the security of electronic document.

Research on the Design and Use of Digital Badges to Increase Educational Value (교육적 가치를 높이는 디지털배지 설계와 활용 연구)

  • Youn A Min;Ji-Eun Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.6
    • /
    • pp.71-86
    • /
    • 2023
  • The rapid change in industry and the technological gap give rise to social demand for upskilling and reskilling and spread of alternative education. Against this backdrop, digital certification and career management tools can be used to manage various types of learning activities comprehensively. Digital badges provide various kinds of history information related to individual learning, and the reliability and transparency of the issued information can be strengthened by applying blockchain technology. There have been various discussions about digital badges for a long time, but due to the lack of standards to support the issuance and distribution of digital badges, they have been partially used in some areas. However, interest in digital badges is increasing due to the development of related technologies, establishment of standards, paradigm changes in higher education, and government policies related to nurturing digital talent. This paper deals with the use of digital badges for efficient and transparent learning management and career management in an online learning environment. The researcher analyzes the technical characteristics and use cases of digital badges, and proposes a plan for use in online higher education based on them.

Technology Trend of the additive Manufacturing (AM) (적층식 제조(Additive manufacturing) 기술동향)

  • Oh, Ji-Won;Na, Hyunwoong;Choi, Hanshin
    • Journal of Powder Materials
    • /
    • v.24 no.6
    • /
    • pp.494-507
    • /
    • 2017
  • A three-dimensional physical part can be fabricated from a three-dimensional digital model in a layer-wise manner via additive manufacturing (AM) technology, which is different from the conventional subtractive manufacturing technology. Numerous studies have been conducted to take advantage of the AM opportunities to penetrate bespoke custom product markets, functional engineering part markets, volatile low-volume markets, and spare part markets. Nevertheless, materials issues, machines issues, product issues, and qualification/certification issues still prevent the AM technology from being extensively adopted in industries. The present study briefly reviews the standard classification, technological structures, industrial applications, technological advances, and qualification/certification activities of the AM technology. The economics, productivity, quality, and reliability of the AM technology should be further improved to pass through the technology adoption lifecycle of innovation technology. The AM technology is continuously evolving through the introduction of PM materials, hybridization of AM and conventional manufacturing technologies, adoption of process diagnostics and control systems, and enhanced standardization of the whole lifecycle qualification and certification methodology.