• Title/Summary/Keyword: cyber society

Search Result 2,488, Processing Time 0.036 seconds

Cyber In-Service Training Contents Development Regarding Environmental Literacy for Entry-Level Environmental Public Servants (신임환경공무원을 위한 환경소양 사이버 연수 콘텐츠 개발)

  • Seo, Woo-Seok;Kim, Su-Wook;Kim, Jae-Ho;Lee, Yoon-Jo
    • Hwankyungkyoyuk
    • /
    • v.21 no.2
    • /
    • pp.25-39
    • /
    • 2008
  • The purpose of the study was to develop cyber in-service training contents regarding environmental literacy for entry-level environmental public servants. The blended type of contents were developed, through literature review, contents analysis of other programs, and expert conferences. The validity of the contents developed was ensured experts in environment. Major research findings were as followings: First, there is a lack of time for entry-level environmental public servants to participate in the environmental in-service training programs. Therefore, cyber training can be a good solution to the problems with environmental training courses. It improves access to educational opportunities as it overcomes the limitations of time and space and provides hands-on experiences through multimedia materials that reflect the real world. Second, directions for developing cyber environmental education contents were represented in three parts; 1) strategies for developing cyber environmental education contents, 2) Models for developing cyber environmental education contents, 3) Contents selection for developing cyber environmental education contents Third, the developed contents for entry-level environmental officers consist of 4 domains: (1) the introduction to environment; (2) the natural scientific understanding of environment; (3) the humanistic understanding of environment; and (4) the social scientific understanding of environment. Fourth, the program developed was evaluated by 7 environmental education experts according to 10 evaluation items of total contents and contents development structure. In result, the validity of the program was ensured. Based on the results, some recommendations were suggested.

  • PDF

The Model to Implement the Cyber Security Policy and Strategy for Azerbaijan Information System (아제르바이잔 정보시스템에 대한 사이버보안 정책과 전략의 실행모델 구축)

  • Aliyeva, Leyla Mehdi;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.23-31
    • /
    • 2019
  • This study aims to build an AHP model that evaluates the priority of cyber security policies for the Azerbaijan information system. For this, 4 factors were constructed from components of ITU National Interest Model, whereas 5 alternatives were based on the best practices of the eight developed countries leading the cyber security field. Using the questionnaire, 24 security experts evaluated the strategic priority of such factors or alternatives. The analysis results using the AHP software showed that homeland defense and economic well-being were the dominant aspects of cyber security policy, whereas capacity building and infrastructure were the main concern of cyber security elements for Azerbaijan. This study presents the strategic priority of cyber security policies that can be adopted by Azerbaijan government. This study can contribute to developing the national cyber security guide of Azerbaijan.

The Relationship of the Concentration in Physical space and the proliferation of Cyber space : focusing on the Concentration of Plastic Surgery Clinics at Kangnam-gu, Korea (사이버 공간의 확산과 물리적 공간에서의 집중화 현상의 관련성 : 성형외과의 강남구 집중현상 고찰)

  • Cho, Yeong-Bin;Choi, Young-Keun
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.1
    • /
    • pp.85-100
    • /
    • 2012
  • The development of technology causes a lot of change. Many researchers have insisted that the proliferation of cyber space changes the physical space. Their insistences have been accumulated into three aspects. Firstly, the proliferation of cyber space brings out the concentration in the physical space, secondly the decentralization and lastly both at the same time. In Korea, the concentration of plastic surgery clinics has taken place in Kangnam-gu area at similar period of the Internet proliferation. In this research, we execute empirical study of whether the concentration of plastic surgery in specific areas correlates with the proliferation of cyber space or not. In order to do this, we verified homogeneity of plastic surgery websites between Kangnam-gu and Non-Kangnam-gu areas. Also, we used three statistical and data-mining techniques which are Multi-discriminant analysis, Decision tree analysis and artificial neural network analysis. As a result, there was homogeneity between two different area plastic surgery clinics websites, but there was not big heterogeneity as well. Therefore, in this case of concentration of plastic surgery in Korea, the proliferation of cyber space restrictively correlates with the concentration of physical space.

A Study on the Cyber-geospace Construction in the Evernet Age (에버넷 시대의 사이버국토 구축방안)

  • 김영표
    • Spatial Information Research
    • /
    • v.11 no.4
    • /
    • pp.371-389
    • /
    • 2003
  • This study aims at defining the concept of a cyber-geospace and proposing how to establish a cyber-geospace fir the entire country in detail. The study defined the cyber-geospace as 'the dynamic second territory of Korea not only to manage the land systematicality and deal with administrative services for the people in aspect of public sector, but also to contain economic activities of corporations and the citizen's everyday lives in aspect of private sector, in a 3D virtual reality made by digitizing various facilities and buildings as well as the entire toterritory including ground, underground and even sea'. In order to establish such a cyber-geospace, the project should be pursued on the national level fir around ten-year period.

  • PDF

The Study on Development and Effectiveness of Web-based Cyber Class Contents for University Student's Career Education (대학생의 진로교육을 위한 웹기반 사이버강의 콘텐츠 개발 및 효과검증)

  • Han, Mi-Hee
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.225-238
    • /
    • 2016
  • The purpose of this study is to develop cyber class contents on website and to verify the effectiveness of the program to reinforce a career education. The participants of the experiment in this study are from Namseoul University who took the cyber class 'Self management and creation of vision.' of the second semester in 2015. They took the class fifty-sixty minutes a week. The control group also includes the students who took the classes 'Theory and practice of school violence prevention' and 'Youth Education theory.' To verify the effectiveness of career education, the data processing in performing this study utilized t-test for homogeneity with the effective variable of career identity and career decision and the result was proved by using paired t-test. The result suggests that the experiment group significantly shows improvement compared with the control group in the view of career identity and career decision level. Therefore we recognize that the web based cyber course has its effect on content development and career education and we anticipate the continuous development and activation of effective cyber education on website for university students in future.

Dosimetric Plan Comparison of Accelerated Partial Breast Irradiation (APBI) Using CyberKnife

  • Lee, Chang Yeol;Kim, Woo Chul;Kim, Hun Jeong;Lee, Jeongshim;Park, Seungwoo;Huh, Hyun Do
    • Progress in Medical Physics
    • /
    • v.29 no.2
    • /
    • pp.73-80
    • /
    • 2018
  • Accelerated partial breast irradiation (APBI) is a new treatment delivery technique that decreases overall treatment time by using higher fractional doses than conventional fractionation. Here, a quantitative analysis study of CyberKnife-based APBI was performed on 10 patients with left-sided breast cancer who had already finished conventional treatment at the Inha University Hospital. Dosimetric parameters for four kinds of treatment plans (3D-CRT, IMRT, VMAT, and CyberKnife) were analyzed and compared with constraints in the NSABP B39/RTOG 0413 protocol and a published CyberKnife-based APBI study. For the 10 patients recruited in this study, all the dosimetric parameters, including target coverage and doses to normal structures, met the NSABP B39/RTOG 0413 protocol. Compared with other treatment plans, a more conformal dose to the target and better dose sparing of critical structures were observed in CyberKnife plans. Accelerated partial breast irradiation via CyberKnife is a suitable treatment delivery technique for partial breast irradiation and offers improvements over external beam APBI techniques.

Evaluation of Participation & Management on the Cyber Hospice Specialist Program (사이버 호스피스 전문 간호 교육 과정에서의 학습참여와 운영평가)

  • Kim, Boon-Han;Choi, Ji-Eun
    • Korean Journal of Adult Nursing
    • /
    • v.15 no.1
    • /
    • pp.105-115
    • /
    • 2003
  • Purpose: The research purposes analyzed the study participation and lecture evaluation of applicants in the cyber hospice specialist education course to find problems of nurse education application on the web. Method: Study participants were 125 nurses for participation and 68nurses for lecture evaluation. The data was analysed by descriptive statistics. Result: The results obtained from this study were as follows 1) The residence distribution of study participants was spread out across the nation. Equal distribution of education was accomplished without a difference among provinces. 2) The average study duration in the study participation was about one hour and a quarter minutes a week, and number of access to lecture notes was 65.8 times. But in a discussion room and a cooperative room, the system using rate was very low, so we considered the idea to come up with a more effective application way. 3) The participant's lecture evaluation of cyber education were generally satisfied about the quality of lecture, time, contents etc. Conclusion: This study shows the possible implication for nursing fields using a web-based learning program for reeducation in a variety of fields, so nursing cyber application can be considered to come up with this more effective method.

  • PDF

Trusted Third Party for Clearing Consumption Tax of Global Electronic Commerce and System Architecture of Global Electronic Tax Invoice (GETI)

  • Yeoul , Hwang-Bo;Jung, Yang-Ook
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.261-267
    • /
    • 2003
  • This study deals with controversial issues surrounding the today′s cyber-taxation and recommends feasible consumption tax system architecture titled Global Electronic Tax Invoice System (GETI). The GETI is an electronic consumption tax architecture to provide "all-in-one" tax and e-payment services through a trusted third party (TTP). GETI is designed to streamline the overall cyber-taxation process and provide simplified and transparent tax invoice services through an authorized np. To ensure information security, GETI incorporates public Key infrastructure (PKI) based digital certificates and other data encryption schemes when calculating, reporting, paying, and auditing tax in the electronic commerce environment. GETI is based on the OECD cyber-taxation agreement that was reached in January 2001, which established the taxation model for B2B and B2C electronic commerce transactions. For the value added tax systems, tax invoice is indispensable to commerce activities, since they provide documentations to prove the validity of commercial transactions. As paper-based tax invoice systems are gradually phased out and are replaced with electronic tax invoice systems, there is an increasing need to develop a reliable, efficient, transparent, and secured cyber-taxation architecture. To design such architecture, several desirable system attributes were considered -- reliability, efficiency, transparency, and security. GETI was developed with these system attributes in mind.

  • PDF

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

A practical challenge-response authentication mechanism for a Programmable Logic Controller control system with one-time password in nuclear power plants

  • Son, JunYoung;Noh, Sangkyun;Choi, JongGyun;Yoon, Hyunsoo
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1791-1798
    • /
    • 2019
  • Instrumentation and Control (I&C) systems of nuclear power plants (NPPs) have been continuously digitalized. These systems have a critical role in the operation of nuclear facilities by functioning as the brain of NPPs. In recent years, as cyber security threats to NPP systems have increased, regulatory and policy-related organizations around the world, including the International Atomic Energy Agency (IAEA), Nuclear Regulatory Commission (NRC) and Korea Institute of Nuclear Nonproliferation and Control (KINAC), have emphasized the importance of nuclear cyber security by publishing cyber security guidelines and recommending cyber security requirements for NPP facilities. As described in NRC Regulatory Guide (Reg) 5.71 and KINAC RS015, challenge response authentication should be applied to the critical digital I&C system of NPPs to satisfy the cyber security requirements. There have been no cases in which the most robust response authentication technology like challenge response has been developed and applied to nuclear I&C systems. This paper presents a challenge response authentication mechanism for a Programmable Logic Controller (PLC) system used as a control system in the safety system of the Advanced Power Reactor (APR) 1400 NPP.