• Title/Summary/Keyword: Smart Education Policy

Search Result 162, Processing Time 0.029 seconds

Photography as a research tool for studying human psychology: Photos of friendship as an example (인간 심리에 대한 연구도구로서의 사진: 우정 사진을 예로)

  • Moon, Kyoung-Suk
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.337-344
    • /
    • 2016
  • For the past half century, researches on human psychology have witnessed the flourish of various research tools in this area. Many psychological measures were developed to get objectified data and this trend has lead to the abundance of quantified results. However, considering subjectiveness and refinements of human experience, the research focused on individual's unique perspectives and explanations is needed also. In this vein, this study proposed the usefulness of photography as a research tool for human psychology. With the wide spread of smart phone, taking photo became the everyday activity for modern people and also a part of a public art. If photo could play an efficient and unique role to study human psychology, the depth and width of human understanding might change dramatically in positive way. Two friendship photos were presented to suggest the possibility of photo as a research tool and final considerations of using photo were suggested briefly.

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.

Validating the Entrepreneurial Intention Model on the University Students in Saudi Arabia

  • HODA, Najmul;AHMAD, Naim;AHMAD, Mobin;KINSARA, Abdullah;MUSHTAQ, Afnan T.;HAKEEM, Mohammad;AL-HAKAMI, Mwafaq
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.469-477
    • /
    • 2020
  • The main objective of this paper is to examine the applicability of Linan and Chen's entrepreneurial intention model (EIM) in predicting the entrepreneurial intention. EIM is an adaptation of the Theory of Planned Behavior that focuses on entrepreneurial intention and hypothesizing slightly different patterns of relationship with regards to subjective norms. The model also includes human capital and demographic factors. Snowball sampling method was used to collect data using the entrepreneurial intention questionnaire (EIQ) through several social media platforms. The survey indicates that the overall entrepreneurial intention of Saudi students is high (mean = 5.41). Eight out of the seventeen hypothesized relationships were found to be significant. Among the demographic variables, gender-personal attitude was significant whereas self employment experience and years of business education were found to be significantly related with perceived behavioral control. The statistical analysis using partial least square structural equation modelling validated the model. All the three antecedents of entrepreneurial intention were significantly related with entrepreneurial intention. The results of this study will help policy makers to get deep understanding into the phenomenon of entrepreneurship among Saudi university students and thereby develop a conducive environment. This study also validates the entrepreneurial intention model in a different cultural context.

An Exploratory Study on Convergence generation according to the convergence level estimation of Digital Device and Service (디지털기기와 디지털서비스의 컨버전스 수준 평가에 따른 컨버전스 세대의 탐색적 고찰)

  • Kim, Yeon-Jeong
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.169-179
    • /
    • 2011
  • The purpose of this study are as follows. First, to analyze digital convergence level of convergence generation to demographic variables. Second, the convergence level to digital device and using frequency to digital service. Third, the convergence level to digital service and using frequency to digital service. The research methods FGI, the interview with IT expert group and survey. The results of research are as follows. First, 30 aging, expert group, higher education group over graduate school are actively using and participated. Second, high level of convergence device are smart-phone, tablet PC, net-book are in order. high level of convergence service are SNS service, twitter, uee, portal messenger and app store, e-Book, web hard are in order. Third, The convergence generation enjoying app-store of smartphone, wireless game and more participating facebook/cyworld twitter, Portal, internet community.

A Study on the Protection of Biometric Information against Facial Recognition Technology

  • Min Woo Kim;Il Hwan Kim;Jaehyoun Kim;Jeong Ha Oh;Jinsook Chang;Sangdon Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2124-2139
    • /
    • 2023
  • In this article, the authors focus on the use of smart CCTV, a combnation of biometric recognition technology and AI algorithms. In fact, the advancements in relevant technologies brought a significant increase in the use of biometric information - fingerprint, retina, iris or facial recognition - across diverse sectors. Both the public and private sectors, with the developments of biometric technology, widely adopt and use an individual's biometric information for different reasons. For instance, smartphone users highly count on biometric technolgies for the purpose of security. Public and private orgazanitions control an access to confidential information-controlling facilities with biometric technology. Biometric infomration is known to be unique and immutable in the course of one's life. Given the uniquness and immutability, it turned out to be as reliable means for the purpose of authentication and verification. However, the use of biometric information comes with cost, posing a privacy issue. Once it is leaked, there is little chance to recover damages resulting from unauthorized uses. The governments across the country fully understand the threat to privacy rights with the use of biometric information and AI. The EU and the United States amended their data protection laws to regulate it. South Korea aligned with them. Yet, the authors point out that Korean data aprotection law still requires more improvements to minimize a concern over privacy rights arising from the wide use of biometric information. In particular, the authors stress that it is necessary to amend Section (2) of Article 23 of PIPA to reflect the concern by changing the basis for permitting the processing of sensitive information from 'the Statutes' to 'the Acts'.

Exploring Enhancements of Data Industry Competitiveness in the Agricultural Sector (농업 부문 데이터 산업 경쟁력 제고 방안)

  • Choi, Ha-Yeon;Im, Ye-Rin;Kang, Seung-Yong;Kang, Seung-Yong;Yoo, Do-il
    • Journal of Korean Society of Rural Planning
    • /
    • v.29 no.4
    • /
    • pp.137-152
    • /
    • 2023
  • Data is indispensable for digital transformation of agriculture with the development of innovative information and communication technology (ICT). In order to devise and prioritize strategies for enhancing data competitiveness in the agricultural sector, we employed an Analytic Hierarchy Process (AHP) analysis. Drawing from existing research on data competitiveness indicators, we developed a three-tier decision-making structure reflecting unique characteristics of the agricultural sector such as farmers'awareness of the data industry or awareness of agriculture among data workers. AHP survey was administered to experts from both agricultural and non-agricultural sectors with a high understanding of data. The overall composite importance, derived from the respondents, was rated in the following order: 'Employment Support', 'Data Standardization', 'R&D Support', 'Start-up Ecosystem Support', 'Relaxation of Regulations', 'Legislation', and 'Data Analytics and Utilization Technology'. In the case of experts in the agricultural sector, 'Employment Support' was ranked as the top priorities, and 'Legislation', 'Undergrad and Grad Education', and 'In-house Training' were also regarded as highly important. On the other hand, experts in the non-agricultural sector perceived 'Data Standardization' and 'Relaxation of Regulations' as the top two priorities, and 'Data Center' and 'Open Public Data' were also highly rated.

The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness (경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향)

  • Jin Young Han;Hyun-Sun Ryu
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.137-153
    • /
    • 2016
  • Organizations depend on smart working environments, such as mobile networks. This development motivates companies to focus on information security. Information leakage negatively affects companies. To address this issue, management and information security researchers focus on compliance of employees with information security policies. Countermeasures in information security are known antecedents of intention to comply information security policies. Despite the importance of this topic, research on the antecedents of information security countermeasures is scarce. The present study proposes information security intelligence as an antecedent of information security countermeasures. Information security intelligence adapted the concept of safety intelligence provided by Kirwan (2008). Information security intelligence consists of problem solving skills, social skills, and information security knowledge related to information security. Results show that problem solving skills and information security knowledge have positive effects on the awareness of employees of information security countermeasures.

A Study on Analysis of the Social Vulnerable Areas Using GIS Spatial Analysis : Focusing on Local Governments in Seoul Metropolis (GIS 공간분석을 활용한 사회 취약지역의 분석에 관한 연구 : 서울특별시를 중심으로)

  • Lee, Myeong Ho;Yu, Seon Cheol;Ahn, Jong Wook;Shin, Dong Bin
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.4
    • /
    • pp.47-58
    • /
    • 2016
  • The purpose of this study was to select the sectoral vulnerable areas index in welfare field and analyze the socially vulnerable areas from comprehensive analysis. For this study, preceding research and theoretical background were reviewed. Through this, we selected for the analysis index and criteria, and data corresponding to the index are collected. Based on the index and criteria, the data analysis was performed in Seoul Metropolitan City selected as the spatial extent of this study. From the results of analysis, the sectoral lower rank 10% of social vulnerable areas was determined. In addition, Junggu, Yongsangu, and Seodaemungu from the comprehensive analysis of individual vulnerable areas were derived as a final vulnerable areas. In particular, Junggu was weak in all sectors; Yongsangu was in the medical sector; and Seodaemungu was poor in housing and education. Lower vulnerability index of all sectors (energy, housing, medical, transportation, and education) in 1st, 2nd, and 3rd residential areas by examining use zoning was showed. From the results of this study, we can expect time and labor saving of policy support in public sector.

The Effects of Video and Online Discussion Activities based on Havruta Style in Social Studies Communication Skills (화상·온라인 하브루타 토론활동이 사회과 의사소통능력에 미치는 영향)

  • Shin, Ho-Jin;Kim, Dae-Myung
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.25-32
    • /
    • 2016
  • The current research was to investigate the effects of discussion activities based on Havruta style on elementary school students' social studies communication skills. For this purpose, we examined a comparative study between 5th grade students and other students of partner schools. As research results, first, online classes using video conference equipment and smart devices will enhance the students' interest and participation in class. Second, the Havruta style helps students not only acquire and internalize knowledge by themselves through the course of reciprocal questions and discussions but also improve presentations and participations. Third, it is necessary not only to draft a new lesson plan and to reconstruct the education process for video and online classes but also to develop the classes with a lesson plan after preparations and discussions with colleague teachers; the process of reflection, such as writing a lesson research journal, has a positive effect to improve the quality of cooperative classes. Fourth, using SNS discussion activities to serve as a complementary activity is good, and two teachers can evaluate each of the students' achievement. It is necessary to have a sufficient number of schools where video and online cooperative learning is possible with video equipment provided. To maximize the effect of video and online classes, various studies and teacher trainings are needed. Education office needs to provide a server that enables students in small and large classes to freely engage in cooperative learning.

A study about a convergence development plan of MOOCs based e-learning in university (MOOCs에 기반한 대학이러닝의 융복합적 발전방안에 관한 연구)

  • Choi, Mi-Na;Roh, Hye-Lan
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.9-21
    • /
    • 2015
  • Nowadays, within the paradigm shift of e-learning, MOOCs service has been expanded among a number of global leading universities and this has affected our domestic universities' e-learning to look for different possibilities and new challenges. In consideration of our domestic educational condition, it is required to contemplate how university e-learning can be changed and developed with focus on MOOCs from the perspective of convergence development. This study suggests plans for convergence development in university e-learning based on MOOCs with conceptual model. We conducted the studies on relevant literature of university e-learning and MOOCs, expert consultation, SWOT analysis, survey for those involved of e-learning centers, etc. Through this process, we developed a final plan which integrates 'open advanced education course service', 'teaching and learning curation service', 'teaching and learning practice service', 'creative teaching and instruction method development and sharing service', and 'cloud based educational platform support service', etc with the perspective of convergence development. Also we designed convergence development plan based on MOOCs. It is assumed that the result of this research provides advanced plans for development of university e-learning and the base for further discussion of introduction and application of MOOCs service in domestic university.