• Title/Summary/Keyword: cyber training program

Search Result 41, Processing Time 0.028 seconds

Satisfaction on the practical training of public institution's staffs in cyber oral health service (공공기관 근무자의 사이버 구강보건사업실무과정 교육에 대한 만족도)

  • Hwang, Yoon-Sook;Cho, Eun-Pyol
    • Journal of Korean society of Dental Hygiene
    • /
    • v.12 no.1
    • /
    • pp.225-233
    • /
    • 2012
  • Objectives : This thesis aims to provide basic materials for exploring trends and operational strategy of the cyber training. To achieve study purpose, it analyzed the satisfaction of trainees in regard to the education of field training course of Cyber Oral Health Promotion Program, established and operated between 2007 and 2009. Methods : This study conducted questionnaire surveys after the completion of training to utilize the satisfaction level of 989 respondents among 1,310 employees of public institutions who completed the field training course of Cyber Oral Health Promotion Program. Results : Respondents showed satisfaction on the training course throughout three years in terms of satisfaction of instructional methods (screen characteristics, educational techniques, and so on) according to educational contents, the connection and realization of online education and service satisfaction, necessary for learning in association with educational guidance, offered to learners by a tutor and rapidity in questions and answers. A majority of respondents in all years answered that they participated in training program voluntarily for self-development and improvement in work ability, and they thought that the completion of course would be helpful to their current work and future work. In addition, cyber training program was primarily conducted in the working place by 72.5%, and the most difficult thing in cyber training was to combine work and learning by 60.6%. Conclusions : As shown in the results above, workers in public institutions were satisfied with cyber job training and it was evaluated that cyber job training would be helpful to performing their actual work. Therefore, it is needed to collect and evaluate more diverse requirements of trainees with regard to cyber job training, and the development and operation of job training program that reflects these results sufficiently is required.

A Six Sigma Cyber Training Program for Green Belt (그린벨트 양성을 위한 6시그마 사이버 교육)

  • Hong, Sung-Hoon;Choi, Young-Shik;Choi, Ik-Jun;Song, Jae-Woong;Kwon, Hyuck-Moo;Lee, Min-Koo
    • IE interfaces
    • /
    • v.17 no.3
    • /
    • pp.384-396
    • /
    • 2004
  • This paper is concerned with a six sigma green belt training program. Comparative studies of existing training programs for three major companies (Samsung Electronics Company, Hyundai Motor Company, and LG Chemical Ltd.) and two consulting firms (Korean Standards Association and Korea Management Association) are performed. Based on the comparative studies, a cyber green belt training program is developed. The training program, which is composed of 34 modules, follows a disciplined process of five macro phases: define, measure, analyze, improve, and control (DMAIC). This cyber training program is serviced in the homepage http://ise.chonbuk.ac.kr/∼sixsigma. It has been utilized as one semester subject of "Six Sigma Quality Management" in the department of industrial engineering. The advantage and disadvantage of this cyber training program are also discussed.

The Effects of Transfer of Education Training on Korean Enterprise Revitalization -Focusing on Characteristics of Education Training Program and Organization Characteristics in Cyber Education- (교육훈련전이가 한국기업의 활성화에 미치는 영향에 관한 연구 -사이버교육의 교육훈련프로그램 및 조직 특성을 중심으로-)

  • So, Won-Hyun;Kim, Ha-Kyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.3
    • /
    • pp.661-676
    • /
    • 2013
  • This article starts with a review of the organization characteristics and corporate education training program, especially in relation to the cyber education. In particular, we empirically analyzed the factors affecting the characteristics of education program (e.g., relatedness of the program contents, method of education and instructor's ability) and the organization characters (e.g., support of manager and coworker, education culture). Hence the main purpose of this article is to suggest an empirical model explaining how these factors affect the transfer of training and enterprise revitalization. Furthermore, we suggested an expanded model about cyber education training program, transfer of training, and corporate's facilitation. We founded that the contents and method of education significantly affect the transfer of training, while instructor's ability does not significantly affect. Supports from manager and coworkers, education culture, and transfer of training also affect the enteprize revitalization.

The Trends of Domestic and Overseas Cyber Security Training (국내외 사이버보안 훈련 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.857-860
    • /
    • 2021
  • The 21st century society has entered the fourth industrial society of machine to machine from the information society of human to machine. Accordingly, countries around the world are always operating efficient crisis management systems that can quickly respond to disasters or crises. As cyber attacks such as cyber warfare are actually progressing, countries around the world are conducting defense training in response to cyber attacks, and reflecting the results of simulation attacks in improving or building security systems. In this paper, we would like to consider the future cyber training development guide by comparing and analyzing the trends of cyber training in domestic and foreign countries.

A Study to Construct Legal Basis for The Cyber Education and Teacher Training (가상교육연수의 제도적 기반구축 연구)

  • Kang, Seong-Guk;Koh, Hyeong-Joo;Kim, Seong-Sik
    • Journal of The Korean Association of Information Education
    • /
    • v.3 no.1
    • /
    • pp.116-124
    • /
    • 1999
  • Cyber education and teacher training is the distance training program which is operating in the Korea National University of Education for teachers and citizen. In this paper, we suggest a model for establishing legal basis of cyber teacher training, by analyzing laws and processing-laws in the parliament and cyber teacher training institutes. The model contain 'The Rule for Operating CTTI(Cyber Teacher Training Institute)', 'The Rule for Using CIT Systems', 'The Rule for Operation CIT'.

  • PDF

Cyber In-Service Training Contents Development Regarding Environmental Literacy for Entry-Level Environmental Public Servants (신임환경공무원을 위한 환경소양 사이버 연수 콘텐츠 개발)

  • Seo, Woo-Seok;Kim, Su-Wook;Kim, Jae-Ho;Lee, Yoon-Jo
    • Hwankyungkyoyuk
    • /
    • v.21 no.2
    • /
    • pp.25-39
    • /
    • 2008
  • The purpose of the study was to develop cyber in-service training contents regarding environmental literacy for entry-level environmental public servants. The blended type of contents were developed, through literature review, contents analysis of other programs, and expert conferences. The validity of the contents developed was ensured experts in environment. Major research findings were as followings: First, there is a lack of time for entry-level environmental public servants to participate in the environmental in-service training programs. Therefore, cyber training can be a good solution to the problems with environmental training courses. It improves access to educational opportunities as it overcomes the limitations of time and space and provides hands-on experiences through multimedia materials that reflect the real world. Second, directions for developing cyber environmental education contents were represented in three parts; 1) strategies for developing cyber environmental education contents, 2) Models for developing cyber environmental education contents, 3) Contents selection for developing cyber environmental education contents Third, the developed contents for entry-level environmental officers consist of 4 domains: (1) the introduction to environment; (2) the natural scientific understanding of environment; (3) the humanistic understanding of environment; and (4) the social scientific understanding of environment. Fourth, the program developed was evaluated by 7 environmental education experts according to 10 evaluation items of total contents and contents development structure. In result, the validity of the program was ensured. Based on the results, some recommendations were suggested.

  • PDF

A Cyber-Training & Education Model for Tug-barge Operators

  • Lee, Eun-Bang;Yun, Jong-Hwui;Jeong, Tae-Gweon
    • Journal of Navigation and Port Research
    • /
    • v.34 no.4
    • /
    • pp.287-292
    • /
    • 2010
  • The purpose of this study was to create a cyber-training & education program in response to the needs of skippers and crews operating tug-barges within Korean coastal waters and the rapid changers in this industry. Skippers and crews are inclined to operate tug-barges on the basis of experience rather than information. It is not easy to provide useful information whenever they want or to drill them in safety management skills, because of their passive attitude toward education and the few opportunities that exist. In order to increase educational opportunities, efficiency and motivation, the authors have developed this program which consists of a 'tug bridge resource management module, risk perception training module, accident case module, operating module and navigation module', and are hoping that this program will enhance and strengthen all tug-barge operations. We are also putting all our energies into designing up to date animation programs and developing new scenarios concerning the method of evaluation and certification distribution.

Development of Hardware In the Loop System for Cyber Security Training in Nuclear Power Plants (원자력발전소 사이버보안 훈련을 위한 HIL(Hardware In the Loop) System 개발)

  • Song, Jae-gu;Lee, Jung-woon;Lee, Cheol-kwon;Lee, Chan-young;Shin, Jin-soo;Hwang, In-koo;Choi, Jong-gyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.867-875
    • /
    • 2019
  • Security awareness and training are becoming more important as cyber security incidents tend to increase in industrial control systems, including nuclear power plants. For effective cyber security awareness and training for the personnel who manage and operate the target facility, a TEST-BED is required that can analyze the impact of cyber attacks from the sensor level to the operation status of the nuclear power plant. In this paper, we have developed an HIL system for nuclear power plant cyber security training. It includes nuclear power plant status simulations and specific system status simulation together with physical devices. This research result will be used for the specialized cyber security training program for Korean nuclear facilities.

Rhyme of Truce, Training Program for moral psychology in Cyberspace

  • Cho, JeongHee;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.176-183
    • /
    • 2019
  • Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

Suggestions for Developing On-Line In-Service English Teacher Training Program

  • Lee, Byeong-Cheon
    • International Journal of Contents
    • /
    • v.13 no.3
    • /
    • pp.32-37
    • /
    • 2017
  • The development of Information and Communications Technology (ICT) has changed the manner in which English teachers are taught as instructors, as well as English language learners. Online-related technology, a product of development of ICT technology, is used for various purposes such as training teachers and enhancing professionalism of current teachers to practice more efficient training. The purpose of this study is to extract common domains and sub-domains related to development of cyber-type in-service training (INSET) through domestic and international case analyses and to develop content areas of INSET using cyberspace or efficient online INSET programs. To accomplish the purpose of this study, domestic and foreign cases were analyzed in relation to direction of development of online English teacher training programs.