최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of the convergence on culture technology : JCCT = 문화기술의 융합, v.9 no.3, 2023년, pp.183 - 192
최은선 (제주대학교 사이버보안인재교육원) , 박남제 (제주대학교 교육대학 초등컴퓨터교육전공)
Digital transformation is taking place rapidly around the world. As the development of digital technology becomes very fast, more information is expected to be digitized. Therefore, the possibility of cyber threats is increasing in transmitting and storing sensitive information such as personal and ...
Korea Intellectual Property Office, The Internet?of Things (IoT) era, there is no thing without?security! https://eiec.kdi.re.kr/policy/materialView.do?num140627
E. Choi and N. Park. Information Security?Humanities in Jeju Story, Jeju National University?Press, 2022.
Personal Information Protection Commission,?Infringement status of personal information.?https://www.privacy.go.kr/front/contents/cntntsView.do?contsNo39
E. Yu. Size of Personal Information Leakage by?Private Enterprises/Institution, Yu Euidong?Councilor's office, 2023.
E. K. Seo. "A Study on the Legislation of Personal?Information Protection in China - Focusing on the?Cyber security law. Journal of Sinology and China?Studies", Vol. 72, No. 0, pp.131-155, 2017.?http://dx.doi.org/10.18077/chss.2017.72..007
Korea Internet & Security Agency. Status of?China's personal information protection law?administrative system and major violations, Korea?Internet & Security Agency, 2021.
S. -S. Park and S. -K. Han. "KASP-Integrated?Learning Model for the Information Security?Education in Elementary Education", Journal of?The Korean Association of information Education?(JKAIE), Vol. 14, No. 2, pp.157-164, 2010.
Korean Statistical Information Service,?Internet(OECD Member Country)https://kosis.kr/statHtml.do?orgId101&tblIdDT_2KAAA13_OECD
M. -S. Rhee. "Strengthening of Information?Protection Education in Regular Schools", KIISC?Review, Vol. 13, No. 6, pp.67-78, 2003.
S. W. Tabor. "Narrowing the Distance:?Implementing a Hybrid Learning Model for?Information Security", Quartely Review of Distance?Education, Vol. 8, Issue 1, pp.47-57,89, 2007.
Y. Jung, E. Choi, N. Park. "Educational Aids?for Teaching Hacking Principles to Strengthen?Computational Thinking Skills to Elementary",?Webology, Vol. 19, No. 1, pp.4527-4536, 2022.?https://doi.org/10.14704/WEB/V19I1/WEB19299
N. Park, N. Kang. "Mutual Authentication?Scheme in Secure Internet of Things?Technology for Comfortable Lifestyle", Sensors,?Vol. 16, No. 1, p.20, 2016. https://doi.org/10.3390/s16010020
D. Cary. China's Cyber, AI Talent Pipeline,?CSET Policy Brief, Center for Security and?Emerging Techonology, 2021.
Ministry of Education of the People's Republic?of China. Information Technology Curriculum?Standards for Compulsory Education (2022?Edition), Beijing Normal University Publishing?Group, 2022.
J. Kim. "International Comparative Study of?Curriculum in Information Education in?Elementary Schools", The Journal of Korean?Practical Arts Education, Vol. 29, No. 1,?pp.55-77, 2023. https://doi.org/10.29113/skpaer.2023.29.1.04
C. A. Tucker, Evaluating Beginning Textbooks.?English Teaching Forum, No. 13, pp.355-361,?1975.
A. Skierso, Textbook Selection and Evaluation,?In M. Celce-Murcia (Ed.), Teaching English as?a second or foreign language, Heinle and Heinle?Publishers, 1991.
Y. M. Kim. Comparative Study on the?Computer Textbooks between India and Korean?High school - for the Academic high school,?Master Thesis. Konkuk University, Seoul,?Korea, 2011.
J. W. Lee and N. Park, Encryption Scheme?Supporting Range Queries on Encrypted?Privacy Databases in Big Data Service Era, In:?Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds)?Computer Science and its Applications. Lecture?Notes in Electrical Engineering, Vol 203.?Springer, 2012. https://doi.org/10.1007/978-94-007-5699-1_76
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.