• Title/Summary/Keyword: Corporate cyber learning

Search Result 7, Processing Time 0.022 seconds

The Effects of Academic Self-Efficacy, Self-Regulated Learning and Online Task Value on Academic Achievement and Learning Transfer in Corporate Cyber Education (기업 사이버교육생의 학업적 자기효능감, 자기조절학습능력, 온라인과제가치가 학업성취도와 학습전이에 미치는 영향)

  • Joo, Young Ju;Kim, So Na;Kim, Eun Kyung;Park, Su Yeong
    • Knowledge Management Research
    • /
    • v.9 no.4
    • /
    • pp.1-16
    • /
    • 2008
  • The purpose of the present study is to explain the effects of academic self-efficacy, self-regulated learning and online task value on academic achievement and learning transfer in corporate cyber education. 202 students who completed S corporate's cyber courses in 2007 and responded to all survey participated in this study. A hypothetical model was proposed, which was composed of academic self-efficacy, online task value and self-regulated learning factors as prediction variables, and learning transfer as well as academic achievement factors as outcome variables. The results of this study through regression analysis as follows. First, learners' academic self-efficacy, self-regulated learning and online task value predict learners' academic achievement significantly. Second, except for academic self-efficacy, learners' self-regulated learning and online task value predict on learners' learning transfer significantly. Third, academic achievement plays a role as mediating value in predicting academic achievement by online task. It implies that learners' academic self-efficacy, online task value and self-regulated learning which predict learners' academic achievement and learning transfer should be considered in developing strategies for the design and operation of cyber courses.

  • PDF

The Structural Relationship among Internal Locus of Control, Interaction, Satisfaction and Learning Persistence in Corporate e-Learning (기업 사이버교육 학습자들의 내적통제소재, 상호작용, 만족도, 학습지속의향 간의 구조적관계)

  • Joo, Young Ju;Shim, Woo Jin;Kim, Eun Kyung;Park, Su Yeong
    • Knowledge Management Research
    • /
    • v.10 no.4
    • /
    • pp.31-42
    • /
    • 2009
  • With the rapid development of information technology, e-learning is growing in corporate. However, there are still problems in learning, such as low learning persistence rate. Learning outcomes are complex phenomenon influenced by a multitude of factors, it is need to considering the direct and indirect causal relationship among various factors. Therefore, the purpose of this study was to develop the causal model that explains the learning outcomes (satisfaction learning persistence) in corporate e-learning. This study was also intended to examine the causal relationship between the interaction and learning persistence through satisfaction mediators. For this, online survey was conducted with a sample of 270 learners who enrolled in cyber training course at A company. The major findings of this study are as follows: First, internality (internal locus of control, ${\beta}=.154$), interaction (${\beta}=.489$), satisfaction (${\beta}=.304$) have direct effect on learning persistence. Second, the interaction has direct effect on the satisfaction (${\beta}=.320$). Third, the satisfaction has direct effect on the learning persistence, and mediating the interaction and learning persistence. This result will contribute to build a learning strategy to improve learning outcomes.

  • PDF

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

The Recognition of Cyber Education and Development Plan of Chungcheongnam-do Civil Servants (충청남도 정예공무원의 사이버교육 인식과 발전방안)

  • Song, Seung-hun;Kim, Eui-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2184-2190
    • /
    • 2017
  • In the age of knowledge informationization, various educational programs utilizing cyber education were introduced to schools, corporate education, military service, lifelong education facilities as well as public education and training programs. In the case of the national government officials, the education and local government officials, which are organized by cyber center in the national civil service personnel development center, are organized by 15 cities and provincial public service training institutes. In 2008, it became to be mandatory for them to receive education and training over a certain period of a year through the introduction of the regular learning system of public officials, and cyber education got active in the education and training of public officials. The purpose of this study is to suggest the development plan of cyber education based on the results of the analysis of the trainees of the civil servants of Chungcheongnam-do who participated in the cyber education in the viewpoint of the public education and training system.

A Study on the Factors Affecting the Drop-out in Corporate E-learning (기업 이러닝 강좌의 중도탈락 영향변인에 관한 연구)

  • Joo, Young-Ju;Shim, Woo-Jin;Kim, Su-Mi;Park, Su-Yeong;Kim, Eun-Kyung
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.1
    • /
    • pp.9-22
    • /
    • 2009
  • As information technology(IT) has been rapidly developed, e-learning is also growing to meet the need of lifelong education using internet. However, with the growth of e-learning has come the big problem of high dropout rates. The purpose of this present study was to identify the major factors influencing drop-out in corporate e-learning. 250 employees(persistence: n=157, dropout: n=93) who enrolled an e-learning course in S company were participated in this study. A logistic regression analysis was performed to identify predictors of dropout. It was determined that individual background(marriage, amount of study time, difficult to combine work and family), learners' characteristics and value of the course were able to predict dropout with nearly 75 percent accuracy.

  • PDF

A search on implications of the Learning Object of SCORM in K-12 education (초·중등교육에서의 학습객체 개념 활용 가능성 고찰)

  • Park, Inn-Woo;Im, Jin-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.2
    • /
    • pp.61-70
    • /
    • 2003
  • Currently many companies and cyber-universities are investing large amount of time and efforts to develop a standard for Web-based learning contents. Among various standards proposed, SCORM(Sharable Content Object Reference Model) has been especially interested regarding web contents and LCMS(Learning Content Management System), In contrast with corporate and adult education, many seem to be skeptical that SCORM could be applied to K-12 education. In the study, opportunities and limitations of the concept for the learning object in 'SCORM' are examined through analyzing relevant studies and cases. In addition, this study examines the learning object in the pedagogical Perspective, and derives suggestions for applying them to K-12 education.

  • PDF

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.