• 제목/요약/키워드: sPEEK

검색결과 72건 처리시간 0.016초

SNS를 활용한 협력학습에서 문제해결력과 성취도에 영향을 미치는 변인들 간의 예측력 규명 (An investigation of predictability among variables having an effect on problem solving skill and achievement in collaborative learning by utilizing SNS)

  • 홍유나
    • 한국인터넷방송통신학회논문지
    • /
    • 제16권5호
    • /
    • pp.221-228
    • /
    • 2016
  • 본 연구는 대학의 SNS를 활용한 협력학습에서 문제해결력과 성취도에 영향을 미치는 변인들 간의 예측력을 규명하는 것을 목적으로 하였다. 이를 위해 수도권 I전문대학 유아교육과 1학년 학생 61명을 대상으로 설문조사를 실시하였으며 수집된 데이터를 바탕으로 중다회귀분석을 실시하였다. 실시 결과, 첫째, 자기효능감, 동료학습, 도움구하기가 문제해결력에 유의한 영향을 미쳤으며, 문제해결력을 70% 설명하는 것으로 나타났다. 둘째, 동료학습 도움구하기, 문제해결력이 성취도를 유의하게 예측하였으며, 성취도를 72% 설명하는 것으로 나타났다. 셋째, 문제해결력은 자기효능감과 성취도 간의 관계를 부분매개 하였다. 위와 같은 결과는 대학의 SNS를 활용한 협력학습에서 대학생의 학업성취도를 향상시키기 위해 학습자가 자기효능감을 갖도록 학습동기를 높여야 하며, 동료학습과 도움구하기가 적극적으로 제공될 수 있는 수업환경을 설계하고, 문제해결력을 신장시킬 수 있는 구체적인 방안이 고려되어야 함을 시사한다.

미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기 (Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law)

  • 김기창
    • 인터넷정보학회지
    • /
    • 제14권3호
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF