• Title/Summary/Keyword: Cyber experience

Search Result 239, Processing Time 0.061 seconds

Designing an Interdisciplinary Learning Environment for Conservatory Students: Using the Liberal Arts to Expand Education and Better Support Performance Interpretation

  • Auh, Yoonil;Shin, Yeon Sook
    • International Journal of Contents
    • /
    • v.10 no.2
    • /
    • pp.1-8
    • /
    • 2014
  • This paper discusses designing an interdisciplinary learning environment to promote learning of the liberal arts for advanced music students in order to expand the boundaries of their education experience beyond the technical mastery of their musical instruments. The paper discusses the utilization of salient features of information, communications, and technology and the use of instructional theory to promote the understanding of how individual pieces of music can be connected to knowledge of the context in which they were created to support the understanding of the relationship between experience in the world and musical composition.

Method of Forewarning Display for Hacking Risk in the Open Wi-Fi (개방형 무료 Wi-Fi의 해킹위험 사전경고 표시)

  • Jeong, Byung-Moon;Lee, Tae-Hee;Lee, Young-Sik;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1143-1150
    • /
    • 2017
  • In this paper, we proposed a method to display a hazard warning of hacking in the UX(: User Experience) concept level for non experts in the open Wi-Fi access area. According to the dangers of the AP raised by capture, we developed an application that provides a warning pop-up on the danger of hacking before using for APs that are distinguished by color and selected.

An Analysis of Cyber Deviant Behaviors for the Practical Education of Information Ethics (실천적 정보통신윤리 교육을 위한 사이버 일탈행위 분석)

  • Yoo, Sang-Mi;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.5
    • /
    • pp.51-70
    • /
    • 2010
  • The purpose of this article is twofold; first, investigates the relations between the cyber deviant behaviors and the reasons it causes in details and second discuss the measure to prevent cyber deviant behaviors and its recurrence. The findings of the study are; First, the factors which influence more to the cyber deviant behaviors are subjective norm, social identity, and self-control in a row. Second, identified such factors, anonymity (+), consciousness on public order (+), learning experience on information norms (-), and social identity have influences on the subjective norm that both factors of internet addiction (+) and anonymity (+) have significant impacts on self-control in negative perspectives. In conclusion, to prevent cyber deviant behaviors will provide a lot of opportunities to develop self-reflections and critical thinking and the ethics of accountability, and ability of sympathy. This study suggests the so-called reflexive practice-oriented process of education on Information as a strategic teaching-learning procedure. The process framework consists of four stages including problem identification, risk analysis, self-reflexive, and practice & evaluation that have a spiral structure, repeats a life-cycle.

  • PDF

Social Workers' ethical beliefs and experiences -Focused on Client-Worker Dual Relationships- (사회복지사의 윤리적 신념과 경험에 관한 연구 -이중관계(dual relationship)를 중심으로-)

  • Kim, Jin Sook;Jang, Yeon Jin
    • Korean Journal of Social Welfare Studies
    • /
    • v.43 no.2
    • /
    • pp.235-266
    • /
    • 2012
  • This study has surveyed 379 social workers to recognize how much they believe their behaviors are ethical related to dual relationship and how many they have experienced dual relationships with their clients. In addition, we also examined if there were significant differences in social workers' beliefs and experiences according to their socio-demographic characteristics and organizational properties. To accomplish this purpose, we conducted frequency analysis, single sample t-test and one-way analysis of variance focusing on sexual, bartering and private relationships. Respondents tend to have a little permissive attitude about dual relationships while they little experienced of them. Social workers's beliefs and experiences are different depending on gender, education level, work experience, position, training experience of ethics and service target. From these results, it suggested that code of ethics for social workers and the curriculum of social work ethics should be revised reflecting on present field situation and inspiring ethical sensitivity.

Consumer′s Perception and Buying Behavior through the Shopping Mall -Focused on the Customers of D Cyber Mall- (소비자의 인터넷 쇼핑몰 이용가치와 불안요소 인지 - D백화점 쇼핑몰 고객을 중심으로 -)

  • 홍성희;배미경;서동주
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.6
    • /
    • pp.69-83
    • /
    • 2002
  • This study examined the effects of demographic variables on buying behavior, and investigated buyers'perceived value and risk perception of the internet shopping mall. The sample was collected by a department store in Daegu, and it included 1,732 individuals using the Cyber Mall. Research methods used in this study were simple statistics, t-test and ANOVA. The buyers perceived values through the internet shopping mall were classified into five categories-price, time, convenience, intrinsic attributes, reliability and the risk perception also was classified such as the overall purchasing process, quality of products, exposure of the personal information, delivery system, refund and exchange. The major findings of this study were 1) most important categories affecting their buying behavior were the value of convenience and following values in order were time, price, reliability, intrinsic attributes. 2) the risk perception were overall purchasing behavior, quality of products, exposure of personal information, delivery, and refund & exchange in order. 3) age of buyers, buying experience on the internet shopping mall, and gender were the important factors affecting the buyers'perceived value and risk. 4) the study also, showed that according to the variety of products, buyers perceived the value and risk differently, for example, the price was the most important perceived value in case of food product. The implication of the study is to strategically suggest how to enhance the buyers'perceived value and diminish perceived risk of different products.

e-Learning System Design and Implementation for Small Sized Cyber Lecturing (소형 사이버강좌를 위한 e-Learning시스템 설계 및 구현 사례)

  • Seo, Chang-Gab;Park, Sung-Kyou
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.161-179
    • /
    • 2004
  • The purpose of this study is to suggest practical experience to develop small sized e-Learning system. The system is designed to help lecturers can arrange interface, organize contents, submit examinations and assess learner's score with no professional computing skills. The system has three advantages. First, it reduced implementation period through the use of GUI. Second, it is ordered to be personalized to construct format of the whole interface. Third, it has operational convenience which can be implemented on PC based system. These personalized features are enabling Learning on Demand. Also, there is comparatively low cost and high effectiveness on e-Learning implementation which facilitating quick adoption of e-Learning in its lectures.

Tangible Tele-Meeting in Tangible Space Initiative

  • Lee, Joong-Jae;Lee, Hyun-Jin;Jeong, Mun-Ho;Jeong, SeongWon;You, Bum-Jae
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.762-770
    • /
    • 2014
  • Tangible Space Initiative (TSI) is a new framework that can provide a more natural and intuitive Human Computer Interface for users. This is composed of three cooperative components: a Tangible Interface, Responsive Cyber Space, and Tangible Agent. In this paper we present a Tangible Tele-Meeting system in TSI, which allows people to communicate with each other without any spatial limitation. In addition, we introduce a method for registering a Tangible Avatar with a Tangible Agent. The suggested method is based on relative pose estimation between the user and the Tangible Agent. Experimental results show that the user can experience an interaction environment that is more natural and intelligent than that provided by conventional tele-meeting systems.

Evolution of PKI Internet Banking in Korea

  • Park, Seungchul
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.44-57
    • /
    • 2019
  • Most banks in Korea have provided Internet banking services based on PKI(Public Key Infrastructure) certificates since the early 2000s when Internet banking began in Korea. To support PKI Internet banking, the Korean government backed the electronic signature law and supported the rapid spread of PKI-based Internet banking by regulating the application of PKI certificates to be compulsory in Internet banking until 2015. PKI Internet Banking in Korea has been developed as a pioneer in this field through many challenges and responses until its present success. Korea's PKI banking, which started with soft-token-based closed banking, has responded to various types of cyber attack attempts and promoted the transition to open banking by accepting various criticisms due to lack of compatibility with international standards. In order to improve the convenience and security of PKI Internet banking, various attempts have been made, such as biometric-integrated smartphone-based PKI authentication. In this paper, we primarily aim to share the experience and lessons of PKI banking by analyzing the evolution process of PKI Internet banking in Korea. It also has the purpose of presenting the challenges of Korea's PKI Internet banking and sharing its development vision.

Research on Consumer's Food Purchasing Intentions through Internet Shopping Mall (인터넷 쇼핑몰 이용 소비자의 식품 구매 의도 분석)

  • Kim, Sung-Hee;Joo, Na-Mi
    • Journal of the Korean Society of Food Culture
    • /
    • v.22 no.6
    • /
    • pp.705-712
    • /
    • 2007
  • In spite of the fact that the food group(Food, Drinks and Health foods & Agricultural and Marine products) occupies little position in total sales of Internet shopping mall, the food group's sales in cyber shopping mall in 2006 have increased 678.1% over 5 years. In addition to the fact that the food consumption pattern has changed from quality-oriented to convenience, health and safety-oriented, the need to decrease the opportunity cost created by housework is rising in the context of increase of women's work participation rate. The wind of change like these will become the foundation on which cyber food industry will be developed. The factors having an effect on consumer purchasing intentions when one buy foods through internet shopping malls are researched in this thesis. For the investigation, women of 697 were surveyed by a questionnaire, and the data were analyzed by the SPSS for WINDOW(Version 12.0). The result is as follows: Factors having an effect on food purchasing intentions are Convenience(Timesaving, Troublesomeness), Customer service(Responsiveness, Reliability, Empathy, Tangibility), Perceived Customer Risk(Economic, Social, Performance risk) and Shopping experience(Easy to find out, Easy process for payment) in order.

A Study for Electronic Surveillance (REID, CCTV, Electronic Resident Card) in Augmented Reality Environment (증강현실 환경 하에서 전자감시(REID, 감시카메라, 전자주민카드)에 관한 소고)

  • Kang, Jang-Mook;Jung, Jo-Nam;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.75-82
    • /
    • 2006
  • Ubiquitous Computing is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous Computing. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the information revolution that Cyber Space saw a prime while world wide web service was expanded was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous Computing revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. This paper checks the present situation of currently proceeding Ubiquitous computing technology(RFID, CCTV) in augmented reality environment. Also, The main purpose of this paper is to analyze the concepts analysis of privacy, personal information, and electronic surveillance in augmented reality environment. Thus this paper treated the analysis of case, technological issue, problem and solution and so on.

  • PDF