• 제목/요약/키워드: cyber-university

검색결과 2,795건 처리시간 0.031초

Web-based Cyber Instruction for EFL Learning

  • 차미양
    • 디지털콘텐츠학회 논문지
    • /
    • 제6권4호
    • /
    • pp.209-216
    • /
    • 2005
  • The aim of this study is to examine the effects of web-based cyber instruction on EFL learning from the viewpoint of learners` perceptions and needs. Data was collected through a questionnaire survey that was carried out with 709 undergraduate student enrolled in three cyber English courses offered at N university during the secind semester in 2004. The results of the study indicated that the learners exhibited a positive attitude towards web-based cyber instruction and considered it a paper educational method in the cyber age. However, the students perceived that web-based cyber instruction was not greatly satisfactory in terms of cultivating their English communicative competence or improving the language skills they needed. It was also found that cyber instruction was still teacher-dominant, lacking in interaction, which made the students passive recipients of informaton presented. In comparison with off-line instruction, cyber instruction was not particularly better in enhancing their motivation interest or concentration on class. To be more effective, cyber instruction needs to be equipped not only with a large variety of contents and class activities, but also with more exposure to authentic language by native English speakers. The finding of the investigation yield some implications for the design and development of web-based cyber EFL programs.

  • PDF

콘텐츠 분류에 따른 사이버 수업 활성화 방안에 관한 연구 (A Study on the Method for Activation of Cyber Class by Classification of Contents)

  • 김경희
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2007년도 추계 종합학술대회 논문집
    • /
    • pp.920-923
    • /
    • 2007
  • 콘텐츠 산업의 발전과 인터넷 네트워크의 전 세계적인 확산 및 지속적인 발달로 대학에서의 사이버 수업이 빠르게 확대되고 있다. 따라서, 사이버강의를 형태별로 구분하여 학습자들의 만족도와 환경을 분석하고 효과 측정 및 활성화하기 위한 방안의 연구가 요구된다. 본 연구에서는, 사이버 강의를 강의시수의 일부분만을 사이버로 하는 부분 강의와 강의시수의 모두를 사이버로 하는 완전사이버로 명명하고 구분하여 학습자 만족도 조사를 실시하였으며, 각 사이버 형태의 문제점을 분석하고 이를 활성화하는 방안을 제안하였다.

  • PDF

Design of Target Cyber Counseling System using Counseling Assistance Agent

  • Pi, Su-Young
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제4권3호
    • /
    • pp.311-315
    • /
    • 2004
  • Because of the characteristics of the cyber world, such as usefulness, anonymousness, patency, economic performance, rapidness, etc., cyber counseling has great possibility. Because he or she may not meet a consultant directly, a client can expose his/her inside problems or secret personal problems, keeping anonymousness. However, existing cyber counseling has the limit in durability of counseling because target counseling appropriate to a client is impossible and a counseling activity is done by one time counseling. In this paper, we attempt to develop a target cyber counseling system in which target cyber counseling is possible. The system will use a counseling assistance agent who can play the role of a counseling supporter as well as a counselor in the cyber space. If target counseling becomes possible, it can heighten efficiency of cyber counseling because a client is satisfied with the result of counseling and thus counseling activities can be continued.

차세대 사이버 보안 동향 (The Trends of Next Generation Cyber Security)

  • Lee, Daesung
    • 한국정보통신학회논문지
    • /
    • 제23권11호
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.

사이버물리시스템에 대한 사이버공격 경호위협 분석 - 지능형건물관리시스템을 중심으로 - (Analysis on Presidential Security Threat of Cyber Physical System by Cyber Attack Focusing Intelligent Building System)

  • 최준성;이삼열
    • 전기전자학회논문지
    • /
    • 제24권2호
    • /
    • pp.669-672
    • /
    • 2020
  • 본 논문에서는 사이버물리시스템에 대한 사이버공격 경호위협 중 지능형건물관리시스템(IBS)을 중심으로 발생할 수 있는 사이버공격의 특성과 주요 위협 시나리오를 분석했다. 분석한 결과 일반적으로 예측이 가능한 위협에 대해 공격의 성공 가능성을 낮추는 것이 현실적인 공격의 대응방법이 되는 것으로 판단하였고, 구체적인 대응방안으로는 다계층 방어시스템의 적용과 보호대상 시스템에 대한 사이버안전진단 사전점검, 이동식 보안관제 시스템과 같은 방안들을 제시하였다.

사이버대학교 유아교육학과의 강의 운영에 관한 사례연구 - H 사이버 대학교 '유아창의성교육' 수업 운영을 중심으로 - (Case Study on the Implementation of the Department of Early Childhood Education in a Cyber University)

  • 권영임
    • 대한가정학회지
    • /
    • 제45권3호
    • /
    • pp.87-96
    • /
    • 2007
  • In order to efficiently improve teaching and learning methods of the department of Early Childhood Education in cyber universities, this research analysed and assessed the problems of the current situation of lectures of the department of early childhood education. Firstly, this research examined the characteristics of cyber-education and the lecturer's role in it. Secondly, the types and status of management of online-lectures were investigated. Finally, the student management and the variety of interaction taking place online were examined. The plan to vitalize the cyber-education of early childhood education that was suggested in this study was mainly focused on developing excellent educational contents and continual research of cyber-education's method of teaching and learning. Then for the activation of online interaction, technological support and teaching strategies are needed to activate online interaction.

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

사이버위기에 대응하기 위한 국가정보기관의 사이버위협정보 공유 역할에 대한 고찰 (Sharing the Cyber Threat Intelligence on Cyber Crises: The Appropriate Role of the National Intelligence Agency)

  • 김대건;백승수;유동희
    • 디지털융복합연구
    • /
    • 제15권6호
    • /
    • pp.51-59
    • /
    • 2017
  • 국가는 전통적으로 국토를 방위하고 국민의 생명과 재산을 보호하는 사명을 가지고 있으며, 이러한 방위의 범위는 지상, 공중, 바다, 우주에 이어 제5의 영역인 사이버 영역을 포함한다. 사이버 영역으로 국가 방위의 범위가 확대 되었지만, 사이버 영역에 있어서는 국가보다는 민간이 더 많은 사이버 관련 출처와 수집수단을 보유하는 정보역전 현상 때문에 정부 주도의 사이버 영역 방위에 어려움을 겪고 있다. 이를 해결하기 위해, 본 논문에서는 먼저 사이버위협정보를 정의하고 그 특성을 분석하였다. 다음으로 정보역전 현상을 극복하기 위한 각국의 노력과 우리나라의 현 주소를 조사하였고, 그 결과를 바탕으로 정부 주도의 사이버 방위를 위한 국가정보기관의 역할과 사이버위협정보의 민간 공유 모델을 제안하였다. 제안된 모델을 국가정보기관에서 활용한다면 사이버위기에 보다 효과적으로 대응할 수 있는 기반 체계가 마련될 것을 기대해 볼 수 있다.

사이버 쇼핑몰 유형에 따른 패션 제품의 구색과 가격 분석 (Assortment and Price Analysis of Fashion Products according to the Types of Cyber Shopping Mall)

  • 김용숙;김현희
    • 복식문화연구
    • /
    • 제16권4호
    • /
    • pp.775-783
    • /
    • 2008
  • Nowadays much amounts and various kinds of fashion products are sold through cyber shopping malls. Vendor type and intermediate type cyber shopping mall among many types of cyber shopping malls were selected to analyze assortment and price of fashion products. fashion products 'Best 100' from two cyber shopping malls were listed and classified. The results were as followed: First, the portion of fashion products at vendor type cyber shopping mall was higher than that of intermediate type. Second, fashion products items such as coat, Jacket, one-piece dress, sweater, t-shirt, pants, skirt, and underwear were sold at cyber shopping malls. Underwear and t-shirt were the best selling items at intermediate type shopping mall, and more expensive and fashionable coat, Jacket, and one-piece dress were the best selling items at vendor type shopping mall. Third, the price range of fashion items at vendor type shopping mall was higher than that of intermediate type shopping mall from 1,000 won to 99,000 won.

  • PDF

Summary of Maritime Cyber Attacks and Risk Management

  • Al-Absi, Mohammed Abdulhakim;Al-Absi, Ahmed Abdulhakim;Kim, Ki-Hwan;Lee, Young-Sil;Lee, Hoon Jae
    • International journal of advanced smart convergence
    • /
    • 제11권3호
    • /
    • pp.7-16
    • /
    • 2022
  • The targets of cyber-attacks are not limited to the websites and internal IT systems of shipping agencies. Ships and ports have become important targets for cyber attackers. This paper examines the current state of ship network security, introduces the International Maritime Organization's resolution on ship network security management, and summarizing the cyber-attacks in maritime so the readers can have a general understanding of maritime environment.