• 제목/요약/키워드: Software Private Education

검색결과 37건 처리시간 0.027초

Utilization of Knowledge Intensive Services for the Innovation of Manufacturers in Korea

  • Lee, Kong-Rae
    • 기술혁신연구
    • /
    • 제12권2호
    • /
    • pp.209-225
    • /
    • 2004
  • This study aims to explore and understand the role of knowledge intensive service activities in the industrial innovation of Korea. It analyzes public and private service inputs to the innovation of manufacturers. The contribution of KISs to the innovation of both service suppliers and manufacturers was analyzed by using survey questionnaire. The results of the analysis revealed that the contribution of KISs to the innovation capability of manufacturers is significant. Large manufacturers that hold internal capability to supply KISs are also active in using external KISs. The manufacturing firms that utilized KISs intensively proved to be more innovative than those did not. Heavy KISs users also entertained benefits of capability enhancement as they improved monitoring and achieved efficient application of knowledge asset into product and process innovation. The role of public KISs in the innovation of manufacturers appeared to be indirect and done mainly through education and public R&D activities. Direct input, such as public software service, was not utilized as much in service suppliers themselves. The major reason is that public KISs may not be relevant to their actual needs. Manufacturers have implemented both tighter integration of familiar KISs and loosely coupled unfamiliar KISs.

  • PDF

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

자기주도학습을 위한 이러닝 콘텐츠 검색 지원 시스템 설계 (E-Learning Content Search Support System Design for Self-Directed Learning)

  • 용성중;김유두;문일영
    • 실천공학교육논문지
    • /
    • 제12권1호
    • /
    • pp.73-83
    • /
    • 2020
  • 최근 공교육, 사교육, 평생교육, 직업훈련교육 분야에서 지식전달 위주의 주입식 교육방식에서 학습자들이 능동적으로 지식에 대처할 수 있는 자기주도학습에 대해 중요성이 대두되고 있으며, 이는 사회변화에 따라 요구되는 인재상으로 스스로 자아개념, 자신감, 창의성을 발견하고 계발시키는 학습 방법으로 더욱 중요해지고 있다. 하지만 자기주도적 학습에 대한 개념 및 전략 등 다양한 이론적 지식들이 존재하고 있지만, 실제 자기주도학습 운영계획 또는 학습 분야에 따라 학습자가 원하는 학문 분야의 콘텐츠를 손쉽게 제공받는 시스템에 대해 부족한 상황이다. 따라서 본 논문에서는 학습자가 자기주도적 학습을 위한 다양한 학습 콘텐츠를 제공받기 위해 정보를 획득하고 의미를 정제하여 범주화 할 수 있는 텍스트 마이닝 기법을 활용하여 온라인상에서 학습자가 습득하려고 하는 학문 분야의 다양한 콘텐츠를 제공하는 시스템을 설계하고 활용하는 방안에 대한 연구를 수행하였다.

Strategies for the Universities to be Locally Engaged while Globally Visible

  • Ramakrishna, Seeram
    • Asian Journal of Innovation and Policy
    • /
    • 제4권3호
    • /
    • pp.271-287
    • /
    • 2015
  • Universities are now operating in a post-globalized world. They need to be locally engaged while globally visible for continued success. Specific strategies include 1) unbundling education using fractal modules approach to facilitate more flexible and customized learning expectations of net generation of students; 2) open-source software and hardware platforms to facilitate collaborations around a short or multi-year, multidisciplinary brain stretching projects motivated by the real world challenges; 3) new courses on innovation and entrepreneurship to nurture experience seeking and enterprising mindset of students; 4) cross-border university- public- private partnerships for developing solutions specific to the local needs and can be scalable for the world; and 5) encouraging faculty members with glocal mindset.

교육망에 XML/EDI를 도입한 문서 관리 시스템 (Document Management System using XML/EDI in Education Web)

  • 고민정;채기준
    • 컴퓨터교육학회논문지
    • /
    • 제3권1호
    • /
    • pp.151-160
    • /
    • 2000
  • 학교에서는 주어진 목표를 달성하기 위해서 상부교육 기관, 일반행정 기관, 지역사회의 유관 기관 및 각종 단체들과 밀접한 관련을 맺고 상호작용을 하는 수단으로 공문서를 이용해 왔다. 기존 전자상거래의 효율을 도모하기 위하여 XML/EDI이 사용되고 있는데, 이를 교육망에 도입하면 교육행정 업무 간소화에 크게 기여할 수 있다. 본 논문에서는 현재 각급 학교에 구축되는 교육정보유통 시스템에서 지원되지 못하는 문서처리를 가능하게 하고, 교육정보유통시스템에 추가할 것을 전재로 XML/EDI를 사용한 문서관리시스템을 구현하였다. 이를 위해서 교육망에서 현재 통용되는 문서를 분석하고, 그에 맞는 새로운 태그들을 개발 구현했다. 인터넷을 기반으로 한 본 시스템은 별도의 응용 프로그램을 강요하지 않고, XML로만 새로운 문서들을 정의하였고, 그에 맞는 DTD를 정의하였다. 그럼으로써, 교사들의 잡무를 줄여, 교사의 본업인 교수-학습에 전념할 수 있도록 하는데 기여한다.

  • PDF

차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템 (Blockchain-Based Access Control Audit System for Next Generation Learning Management)

  • 천지영;노건태
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제9권11호
    • /
    • pp.351-356
    • /
    • 2020
  • COVID-19 감염증의 확산으로 언택트 교육을 위한 차세대학습관리시스템의 필요성이 빠르게 증가하고 있으며, 교육부는 4세대 나이스 구축을 통해 미래 교육을 계획하고 있다. 4세대 나이스 시스템이 잘 활용되었을 경우, 맞춤형 교육 서비스 제공, 교육데이터 이용 활성화 등의 장점이 존재하나, 사용자의 권한이 다양하여 엄격한 권한부여가 힘든 접근제어 환경에서 불법적인 접근 문제를 해결할 수 있는 방안이 필요하다. 본 논문에서 우리는 차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템을 제안한다. 제안하는 시스템을 통해 민감한 개인정보는 암호화하여 저장하고, 추후 감사자가 감사를 수행할 때 복호화에 필요한 비밀키를 발급함으로써 원활한 감사가 이루어지도록 한다. 또한, 저장된 로그정보의 위·변조 및 삭제 등을 방지하기 위해 로그 정보를 블록체인에 저장하여 안정성을 확보하였다. 이를 위해 계층적 ID 기반 암호와 프라이빗 블록체인을 사용하여 교육부와 같은 상위 기관에서 각 기관의 접근권한을 총괄적으로 관리할 수 있도록 구성한다.

DEVELOPMENT OF A VALLEY MANAGEMENT SYSTEM FOR GIS AND REMOTE SENSING EDUCATION

  • Wu, Mu-Lin;Wong, Deng-Ching;Wang, Yu-Ming
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2006년도 Proceedings of ISRS 2006 PORSEC Volume II
    • /
    • pp.570-573
    • /
    • 2006
  • College GIS and remote sensing education usually consists of commercial software packages implementations in the classroom. Computer programming is quite important when college graduates work in private or public sectors relevant with GIS and remote sensing implementations. The objective of this paper was to develop a valley management system which implements GIS and remote sensing as the key components for education. The Valley Authority is entitled with water resource protection for sustainable drinking water supply of the second largest city in Taiwan. The test area consists of three different government agencies, Forest Service, EPA, and Water Resource Agency. Materials were provided by the Valley Authority in ArcGIS file format. MapObjects have made the GIS development process much easier. Remote sensing with image manipulation functions were provided by computer programming with Visual Baisc.NET and Visual C#.NET. Attributes inquiry are performed by these two computer languages as well. ArcGIS and ArcPad are also used for simple GIS manipulations of the test area. Comparison between DIY and commercial GIS can be made by college students. Functions provided by the developed valley management system depending on how many map layers have been used and what types of MapObjects components have been used. Computer programming experience is not essential but can be helpful for a college student. The whole process is a step-by-step sequence which college students can modify to depict their capability in GIS and remote sensing. The development process has gone through one semester, three hours every week in 18 weeks. College students enrolled in this class entitled with GIS showed remarkable progresses both in GIS and remote sensing.

  • PDF

A Study on the Protection of Biometric Information against Facial Recognition Technology

  • Min Woo Kim;Il Hwan Kim;Jaehyoun Kim;Jeong Ha Oh;Jinsook Chang;Sangdon Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권8호
    • /
    • pp.2124-2139
    • /
    • 2023
  • In this article, the authors focus on the use of smart CCTV, a combnation of biometric recognition technology and AI algorithms. In fact, the advancements in relevant technologies brought a significant increase in the use of biometric information - fingerprint, retina, iris or facial recognition - across diverse sectors. Both the public and private sectors, with the developments of biometric technology, widely adopt and use an individual's biometric information for different reasons. For instance, smartphone users highly count on biometric technolgies for the purpose of security. Public and private orgazanitions control an access to confidential information-controlling facilities with biometric technology. Biometric infomration is known to be unique and immutable in the course of one's life. Given the uniquness and immutability, it turned out to be as reliable means for the purpose of authentication and verification. However, the use of biometric information comes with cost, posing a privacy issue. Once it is leaked, there is little chance to recover damages resulting from unauthorized uses. The governments across the country fully understand the threat to privacy rights with the use of biometric information and AI. The EU and the United States amended their data protection laws to regulate it. South Korea aligned with them. Yet, the authors point out that Korean data aprotection law still requires more improvements to minimize a concern over privacy rights arising from the wide use of biometric information. In particular, the authors stress that it is necessary to amend Section (2) of Article 23 of PIPA to reflect the concern by changing the basis for permitting the processing of sensitive information from 'the Statutes' to 'the Acts'.

The Effect of Halal Awareness on Purchase Intention of Halal Food: A Case Study in Indonesia

  • VIZANO, Nico Alexander;KHAMALUDIN, Khamaludin;FAHLEVI, Mochammad
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권4호
    • /
    • pp.441-453
    • /
    • 2021
  • This study seeks to examine the effect of attitude, subjective norm, and perceived behavioral control on the purchase behavior of students enrolled in a private higher education establishment in Tangerang, Indonesia. This is a quantitative study and it employs samples by simple random sampling of 410 university students. The returned and valid questionnaire results totaled 261 samples. Data processing used the SEM method with SmartPLS 3.0 software. The findings of this study reveal that attitude, subjective norm, and perceived behavioral control have a significant effect on purchase intention. Meanwhile, purchase intention has a significant effect on working students' purchase behavior, and halal awareness had a moderating effect of purchase intention on purchase behavior. Purchasing interest has a positive effect on purchasing behavior, and this study proves that halal awareness is able to moderate the effect of purchase intention on purchasing behavior toward halal food products. The higher the awareness of halal products, the greater the relationship between buying interest and buying behavior of halal food. The results of this study also show the importance of paying attention to halal awareness factor in the form of increasing the relationship between buying interest and buying behavior of halal food products.

A Quest of Design Principles of Cognitive Artifacts through Case Analysis in e-Learning: A Learner-Centered Perspective

  • PARK, Seong Ik;LIM, Wan Chul
    • Educational Technology International
    • /
    • 제10권1호
    • /
    • pp.1-23
    • /
    • 2009
  • Learners are often posited in a paradoxical situation where they are not fully involved in decision making processes on how to learn, in designing their tools. Cognitive artifacts in e-learning are supposed to effectively support learner-centered e-learning. The purpose of the study is to analyze cases of cognitive artifacts and to inquire those design principles for facilitating the learner-centered e-learning. Four research questions are suggested: First, it will be analyzed the characteristics of learners with respect to design of cognitive artifacts for supporting the learner-centered e-learning. Second, characteristics of four cases to design cognitive artifacts in learner-centered e-learning environment are analyzed. Third, it will be suggested the appropriate design principles of cognitive artifacts to facilitating learner-centered learning in e-learning environment. Four cases of cognitive artifacts design in learner-centered e-learning was identified as follows: Wiki software as cognitive artifacts in computer-supported collaborative learning; 'Play Around Network (PAN)' as cognitive artifact to monitor learning activities in knowledge community; Knowledge Forum System (KFS) as a cognitive artifact in knowledge building; cognitive artifacts in Courses-as-seeds applied meta-design. Five design principles are concluded as follows: Promoting externalization of cognitive artifacts to private media; Helping learners to initiate their learning processes; Encouraging learners to make connections with other learners' knowledge building and their cognitive artifacts; Promoting monitoring of participants' contributions in collaborative knowledge building; Supporting learners to design their cognitive artifacts.