Analysis of the Curriculum of Departments of Information Security in Universities and Comparison with Industrial Needs in Korea

Size: px
Start display at page:

Download "Analysis of the Curriculum of Departments of Information Security in Universities and Comparison with Industrial Needs in Korea"

Transcription

1 Journal of Industrial Intelligent Information Vol, o, September 0 Analysis of the Curriculum of Departments of Information in Universities Comparison with Industrial eeds in Korea Min-Jeong Kim, Haeni Lee, Shin-Jeong Song, Jinho Yoo Sangmyung, Seoul, Korea {koreaminjeong, ksnn00}@gmailcom; {songforsong, jhyoo}@smuackr Research Center), private educational institution, KISA etc So this paper investigates the curriculum of information security in Universities of Korea then compare with Industrial needs of information security by using SPSS Through this analysis, we will be discussed a way to compensate for the lack of the curriculum Abstract These days cyber attacks are increasing all over the world, the national critical infrastructure information network protection have become important For this reason, the concentrated investment in information security bringing-up professional human resource are essential, but there is a shortage of information security workforce in Korea Currently, departments of information security in Universities make efforts to bring up human resource of information security On the other h they have an increasing interest in the curriculum design of information security So this paper investigates the curriculum of information security in Universities of Korea, then compare with industrial needs of information security Through this analysis, we will get implications about curriculum design of information security II Information security curriculum related study began in earnest in the late 0s Starting with Chul Kim (00) []'s study about information security curriculum development of Universities, Jeong-Mo Yang (00) [], Tae Sung Kim et al (00) [], Hyeon-Mi Rha (00) [], Jung-Duk Kim Tae-suk Baek (0) [] are representative Chul Kim (00) studied that dealt with general methodology of curriculum development in the field of education, characteristics of Korea international information security curriculum Also Undergraduate graduate information security education curriculum model is proposed [] And major in undergraduates Law,, Administration Computer science, Engineering Electrical Engineering Communication Engineering Mathematics, Physics suggested by classified [] Jeong-Mo Yang (00), the new exped information security-related departments in four-year major Universities the curriculum are classified to Mathematics group Electronic Communications group Computer Engineering group related field combined others [] And based on this, he suggested the curriculum model of the future for the field of information security [] Tae Sung Kim et al (00) analyzed the information security education institution with The Korea Education Development Institute for Statistical Yearbook of Education, classified with Colleges, four-year, Master Degree, Doctor Degree [] Then expected to supply the information security workforce after graduation using the students data of related department [] Hyeon-Mi Rha (00), in case of Korea, each professors are leading curriculum development operation [] So she pointed out exist Index Terms information security, curriculum of information security, industrial needs of information security I ITRODUCTIO Last March 0, computer networks of the key broadcasters banks in Korea were completely paralyzed in what appears to be cyber attacks And June, the websites modulation of South Korea s presidential office, the ruling party major media companies DDoS attack was turned out to be the work of orth Korea Cyber attacks are becoming larger security threats in the country while the national critical infrastructure information depending on network The type of information breach is becoming advanced diversification Due to these things cybercrime such as Hacking, Malware Code, DDoS is directly related to national security For this reason, the concentrated investment in information security professional human resource are urgent However, according to Korea Internet & Agency (KISA) conducted in The 0 Survey Analysis of Information Workforce Supply Dem Outlook, lacking human resource of information security industry is, in 0, as many as,0 people will be shortage in 0 [] Training institutions for lack of manpower are Universities Graduate Schools, ITRC (Information Technology Manuscript received October, 0; revised April, 0 doi: 00/jiii- RELATED WORKS

2 Journal of Industrial Intelligent Information Vol, o, September 0 not information security curriculum organization operating [] In addition, she found that these curriculum of Korea America curriculum developed in ational level collaboration with industry are difference [] Jung-Duk Kim Tae-suk Baek (0) say that information security professional supply of Universities is regional disparity, information security professional new supply is not enough to new dem [] III TABLE I Subject Categorization Programing Computing Communication etwork Attack (Hacking, Malware, etc) Information Theory Mathematics Cryptograph Law Policy Other Total Group Technology Engineering AALYSIS OF IFORMATIO SECURITY CURRICULUM Currently, departments of information security have been established in College,, Cyber Graduate School or in computer engineering department Technical Theory Policy A Analysis based on the Curriculum According to status of manpower by the regular curriculum in 0 ational Information White Paper(KISA), as of 0, 0 departments of information security have been established in Universities [] Universities surveyed based on 0 ational Information White Paper (KISA) new departments of 0 were selected Finally Universities that public can read the curriculum were surveyed Other B Analysis of the Curriculum in Universities The target of analysis is Universities (Konyang Univ [], Kyonggi Univ [], Kyungdong Univ [0], Korea Univ [], Gwangju Univ [], Far East Univ [], Daejeon Univ [], Tongmyong Univ [], SoonChunHyang Univ [], Youngdong Univ [], Joongbu Univ [], Hoseo Univ [], Howon Univ [0], Seoul Women s Univ [], Seonam Univ [], Baekseok Univ [], Ajou Univ [], Mokpo Univ []) departments Subject Subject Categorization: This paper divided the curriculum of each into category with reference Min-Jeong Kim et al (0) [] Programing Computing Communication etwork Database Attack(Hacking, Malware, etc) Information Theory Mathematics Cryptograph ⑪ Law Policy ⑫ Other And re-classified into four groups - Technology Engineering Technical Theory Institution Other [] The Programming Computing of entire information security department curriculum were the highest proportion (%) Table I In addition, the Technology Engineering made up 0% of the curriculum, adding the Technology Theory was % occupied On the other h, the Institution was lower than Other, as a result the proportion was lowest AALYSIS OF THE CURRICULUM I UIVERSITY Frequency Rate (%) Position of Universities of Information Department: In this paper, position of department of information security in each was investigated If position is not clear, separately summarized on the basis of Degree Table II % of all is the Engineering If adding the atural Science, % of all is in the Science Engineering Only one department is in the Humanities Social TABLE II CLASSIFICATIO ACCORDIG TO POSITIO OF THE DEPARTMET OF IFORMATIO SECURITY Position umber Rate (%) Engineering atural Science Humanities Social Total 00 IV SURVEY RESULTS A Survey a Information Professionals in the eeds knowledge of industry was investigated targeting currently security personnel Survey lists were written by reference to Knowledge Technology presented by Tae Sung Kim (00) [] curriculum of information security departments It is separated by kind of security-related knowledge skills, used a -point scale according to the level of needed B Statistical Analysis Using SPSS This paper analyzed the survey using SPSS After factor analysis about survey, through computing each classified mean value was calculated executed nonparametric correlation analysis between Universities curriculum survey result

3 Journal of Industrial Intelligent Information Vol, o, September 0 This paper used the Spearman rank-order correlation coefficient the Kendall s tau for non-parametric correlation coefficient The Spearman rank-order TABLE VI RAK OF THE IDUSTRY EEDS Rank Subject Categorization 0 Communication etwork Information Theory Programing Computing Attack (Hacking, Malware, etc) Law Policy Mathematics Cryptograph correlation coefficient is - rs, closer to determined the ranking is similarly, closer to - determined the ranking method is opposition [] So if ranking is matched completely, the value is, if ranking is opposition completely, the value is - [] Kendall s tau τ is calculated from statistics, it is showed how is consistence the order in ranking a series [] TABLE III SURVEY SUBJECT Man Women Research Reply The results of non-parametric correlation analysis, Kendall s tau between Universities curriculum needs knowledge of industry is TABLE IV IDUSTRY EEDS - P OIT SCALE MEA VALUE Subject Categorization Programing Computing Communication etwork Attack (Hacking, Malware, etc) Knowledge (Survey list) 0 Information Theory -point scale mean τ = 0 ( = 0) mean And Spearman rank-order correlation coefficient is 00 rs = 0 ( = 0) Therefore the correlation between curriculums eeds is not statistically significant In other words, there are significant difference between curriculum needs TABLE VII COMPARISO UIVERSITIES CURRICULUM AD EEDS OF IDUSTRY 0 0 Mathematics Cryptograph Law Policy 0 0 Kendall s tau Spearman s rho Universities curriculum needs knowledge of industry rank is in Table V, Table VI TABLE V Rank 0 RAK OF THE CURRICULUM Subject Categorization Programing Computing Communication etwork Mathematics Cryptograph Information Theory Attack (Hacking, Malware, etc) Law Policy V RESULT AD COCLUSIO Results Discussion include the following: The curriculums of information security departments in Universities of Korea focus on the Technology Engineering There is a big deviation in Universities between subjects related with Technology

4 Journal of Industrial Intelligent Information Vol, o, September 0 Most of the departments of information security belong to Engineering There are significant difference between curriculum needs To show direction for more information security manpower in the future, this work has investigated the following three research issues First, administrative process like a management or system of information security is needed to replenish Due to the fact that most of the departments of information security are part of the Engineering, many subjects are weighted Technology Engineering We should recognize that information security is very important not only Technology but also Therefore, replenish of curriculum related with technology management is required It is necessary to deal with processes policy or law in this connection Due to the exist of ISMS(Information System) certification obligation, from now on more dem for manpower are expected to happen in part of information security consulting in Korea Proper balance of subjects between technology management system will lead to significant advances for information security professionals For this reason, enlarge of curriculum related with Institution in Universities is required Second, the Technology Engineering isn't concentrated in several processes Various method the attacks of scale are rising with the progress of cyber space Emphasizing the importance of response to cyber attacks, educational institution to train information security professionals is need to realize that the importance of the curriculum related to cyber attacks Make curriculum better which weighted in existing Programming Computing, Communication etwork is required And it is necessary to open subjects related with,, etc Third, it is necessary to replenish curriculums needed in field work There is a big difference between needs knowledge skills for information security professionals in field work curriculum of information security departments in Universities of Korea as shown in correlation analysis Especially, there is a big difference between Mathematics Cryptograph To reduce the adaptation time for work be immersed in business it is necessary to exp into subjects what correlate with knowledge of industry needed in case information security manpower put into field work In this paper we investigated the curriculum of departments of information security in Universities of Korea As a result, the curriculums of information security in Universities of Korea focus on the Technology Engineering, most of departments of information security are in the Engineering College And there is a big deviation related with subjects of management of technology And to check that the curriculums of information security departments in Universities of Korea are how much coincide with industrial needs of information security, non-parametric statistical analysis are conducted by using SPSS There is a big difference between the curriculum of information security departments in Universities industrial dem of information security So, we should consider not only Technology but also Law Policy etc, when designing curriculum of information security departments in Universities And, we should know Technology subject is too focused to Programming area, so it is need to make various technology subjects What is important is that it is necessary to exp into subjects of high industrial needs Based on this research, we will analysis new established curriculum trace trend of information security curriculum in the future In addition to, we will research about availability satisfaction of information security curriculum carry out analysis about the subjects of information security additionally needed in the company ACKOWLEDGMET This research was supported by the MSIP(Ministry of Science, ICT & Future Planning), Korea, under the "Employment Contract based Master's Degree Program for Information " supervised by the KISA(Korea Internet Agency)(H0--00) REFERECES [] D K Shin (March 0) Information security, now workforce is the first Digital Times [Online] 00 [] C Kim, A study on information security curriculum development at the university, Journal of The Korea Institute of information & Cryptology, vol, pp, pp -, June 00 [] J M Yang, A study on comparative analysis of curriculum of information security department in the university of Korea, Journal of The Korea Institute of Information & Cryptology, vol, no, pp -, April 00 [] T S Kim, J H Kim, M J Kim, Analysis on information security educational institutions with statistical yearbook of education, The Journal of the Korea Information Communications Society, vol, no 0B, pp 0-0, October 00 [] H M Rha, A Study on united stated training stard for information systems security professionals, Korea Research Institute for Vocational Training, 00 [] J D Kim T Baek, A study on essential body of knowledge education certification program for information security professional development, SDPM, The Journal of Digital Policy &, vol, no, pp -, October 0 [] IS, 0 ational Information White Paper, KISA, May 0 [] Konyang Univ Department of Information Homepage [Online] [] Kyonggi Univ Department of Convergence Homepage [Online] 000&orgCd=K000 [0] Kyungdong Univ Department of Information Homepage [Online] [] Korea Univ Department of Computer & Information Science Homepage [Online] [] Gwangju Univ Department of Cyber & Police Homepage [Online]

5 Journal of Industrial Intelligent Information Vol, o, September 0 [] Far East Univ Department of Cyber Homepage [Online] TR_ &menuId=MU_ [] Daejeon Univ Department of Hacking & Homepage [Online] [] Tongmyong Univ Department of Information Homepage [Online] &menuseq=000&confseq=&boardseq=- [] Soon Chun Hyang Univ Department of Information Homepage [Online] [] Youngdong Univ Department of IC Homepage [Online] [] Joongbu Univ Department of Information Homepage [Online] [] Hoseo Univ Department of Information Homepage [Online] [0] Howon Univ Division of Cyber Investigation Police Homepage [Online] [] Seoul Women s Univ Department of Information Homepage [Online] asp [] Seonam Univ Department of Computer & Information Homepage [Online] = [] Baekseok Univ Department of Information Homepage [Online] [] Ajou Univ Department of Information Computer Engineering Homepage [Online] [] Mokpo Univ Department of Information Homepage [Online] [] M J Kim, H Lee, S J Song, J Yoo, A Discussion about the curriculum of department of information security in domestic universities graduate schools, CISC-S, pp, June 0 [] T S Kim, Information Manpower Policy, CBU Press, August 00 [] H J o, Using SPSS research methods statistical analysis, HakHynSa, January 0 [] Education Research Institute Seoul ational, Glossary of Education, HaWooDongSeol, June Min-Jeong Kim received her bachelor's degree in Mathematics at Korea in 00 She is studying Information as a postgraduate at Sangmyung Her research interests include issues related to Information Policy Shin-Jeong Song got a Bachelor of Business Administration at Sangmyung in 0 She is a graduate student at Sangmyung studying Information now Her research interests include issues related to information security Policy Haeni Lee got a Bachelor of Business Administration Cloting&Textile at Sangmyung in 0 She is a graduate student at Sangmyung studying Information now Her research interests are information security policy, security management industrial security Jinho Yoo is a Professor at Sangmyung He received his Ph D in Information from Graduate School of Information at Korea Prior to joining Sangmyung, He worked as Director of Internet Culture Development Department at KISA(Korea Internet Agency) as a principal consultant of CRM data mining at IBM Korea His research interests include issues related to Information Policy

Comprehensive University Accreditation System

Comprehensive University Accreditation System Comprehensive Accreditation System Schedule of Accreditations, by Year and Korean Council for Education Center for Accreditation 2nd Cycle Accreditations (2001-2006) Table 1a: General Accreditations, by

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Turnover on Information Security Professionals: Findings from Korea

Turnover on Information Security Professionals: Findings from Korea HyeWon Yoo, TaeSung Kim 169 Turnover on Information Security Professionals: Findings from Korea HyeWon Yoo *, TaeSung Kim Department of Management Information Systems College of Business, Chungbuk National

More information

Educational Requirement Analysis for Information Security Professionals in Korea

Educational Requirement Analysis for Information Security Professionals in Korea Educational Requirement Analysis for Information Security Professionals in Korea Sehun Kim Dept. of Industrial Engineering, KAIST, 373-1, Kusong-dong, Yusong-gu, Taejon, 305-701, Korea shkim@kaist.ac.kr

More information

Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security

Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security International Distributed Sensor Networks Volume 2015, Article ID 581563, 5 pages http://dx.doi.org/10.1155/2015/581563 Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data:

More information

Compliance Risk Assessment Measures of Financial Information Security using System Dynamics

Compliance Risk Assessment Measures of Financial Information Security using System Dynamics Compliance Risk Assessment Measures of Financial Information Security using System Dynamics Ae Chan Kim 1, Su Mi Lee 2 and Dong Hoon Lee 3 1, 3 Graduate School of Information Security, Korea University

More information

Workload and Work Importance of Clinical Research Nurse

Workload and Work Importance of Clinical Research Nurse , pp.85-92 http://dx.doi.org/10.14257/ijbsbt.2015.7.5.08 Workload and Work Importance of Clinical Research Nurse Su A Kwon 1 and Nam Young Yang 1+ Department of Nursing, College of Nursing, Konyang University,

More information

A Study of Effect of Information Security Management System[ISMS] Certification on Organization Performance

A Study of Effect of Information Security Management System[ISMS] Certification on Organization Performance 10 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.3, March 2010 A Study of Effect of Information Security Management System[ISMS] Certification on Organization Performance

More information

A Research on Security Awareness and Countermeasures for the Single Server

A Research on Security Awareness and Countermeasures for the Single Server , pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business

More information

Demand-Driven Curriculum for Embedded System Software in Korea

Demand-Driven Curriculum for Embedded System Software in Korea Demand-Driven Curriculum for in Korea Suehee Pak Dongduk Women s University 23-1 Hawolgok-dong, Sungbuk-gu Seoul 136-714, Korea Eunha Rho Sungkonghoe University 1-1 Hang-dong, Kuro-gu Seoul 152-716, Korea

More information

Declining MIS Enrollment: The Death Of The MIS Degree? Gary Saunders, Marshall University, USA T. Maurice Lockridge, Marshall University, USA

Declining MIS Enrollment: The Death Of The MIS Degree? Gary Saunders, Marshall University, USA T. Maurice Lockridge, Marshall University, USA Contemporary Issues In Education Research January 2011 Volume 4, umber 1 Declining MIS Enrollment: The Death Of The MIS Degree? Gary Saunders, Marshall University, USA T Maurice Lockridge, Marshall University,

More information

Human Resource Forecast and Development Plan to Support Logistics Infrastructure Improvement

Human Resource Forecast and Development Plan to Support Logistics Infrastructure Improvement Human Resource Forecast Development Plan to Support Logistics Infrastructure Improvement P. Indranoi N. Kecharananta Abstract Logistics has become an important tool for improving efficiency of operation,

More information

A Study on Smart Phone Use Condition of Infants and Toddlers

A Study on Smart Phone Use Condition of Infants and Toddlers , pp.123-132 http://dx.doi.org/10.14257/ijsh.2013.7.6.12 A Study on Smart Phone Use Condition of Infants and Toddlers Yu-Mi Baek 1, Jeong-Min Lee 2 and Kyu Soo Kim 3 1 Yu-Mi Baek. Professor, Dept. of Education

More information

Doctoral Nursing Education in South Korea

Doctoral Nursing Education in South Korea Doctoral Nursing Education in South Korea Hyeoun-Ae Park, RN, PhD, FAAN*, Ok Soo Kim, RN, PhD**, Myung Kyung Lee, RN, PhD*** Introduction History of nursing education in Korea goes back to 1903 when Bogu

More information

Device-based Secure Data Management Scheme in a Smart Home

Device-based Secure Data Management Scheme in a Smart Home Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,

More information

The Performance of Customer Relationship Management System:

The Performance of Customer Relationship Management System: The Performance of Customer Relationship Management System: antecedents and consequences 1 Hyun Gi Hong, 2 Je Ran Chun 1, First Author Dept. Of Business Administration, Cheongju University, hghong@cju.ac.kr

More information

Studying Security Weaknesses of Android System

Studying Security Weaknesses of Android System , pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced

More information

The Roles of Critical Care Advanced Practice Nurse

The Roles of Critical Care Advanced Practice Nurse Journal of Korean Academy of Nursing (2006) Vol. 36, No. 8, 1340 1351 The Roles of Critical Care Advanced Practice Nurse Sung, Young Hee 1, Yi, Young Hee 1, Kwon, In Gak 1, Cho, Yong Ae 1 Purpose. To determine

More information

Job Satisfaction of Clinical Research Nurse

Job Satisfaction of Clinical Research Nurse , pp.242-246 http://dx.doi.org/10.14257/astl.2015.88.51 Job Satisfaction of Clinical Research Nurse Su A Kwon 1, Nam Young Yang 1+ 1 Department of Nursing, College of Nursing, Konyang University, Daejeon,

More information

A study of Clinical Nurses knowledge about Critical Practice Guideline for Diabetes Mellitus 1

A study of Clinical Nurses knowledge about Critical Practice Guideline for Diabetes Mellitus 1 , pp.130-134 http://dx.doi.org/10.14257/astl.2015.88.27 A study of Clinical Nurses knowledge about Critical Practice Guideline for Diabetes Mellitus 1 YoungHee Kim 1 1 Department of Nursing, Tongmyong

More information

Cyber Security Trends and Challenges

Cyber Security Trends and Challenges Cyber Security Trends and Challenges Prof. Heejo Lee Dept. of Computer Science and Engineering Korea University, Heejo@korea.ac.kr June 23, 2015 Contents 1 2 3 4 5 Introduction Cyber security attack trends

More information

Density Map Visualization for Overlapping Bicycle Trajectories

Density Map Visualization for Overlapping Bicycle Trajectories , pp.327-332 http://dx.doi.org/10.14257/ijca.2014.7.3.31 Density Map Visualization for Overlapping Bicycle Trajectories Dongwook Lee 1, Jinsul Kim 2 and Minsoo Hahn 1 1 Digital Media Lab., Korea Advanced

More information

Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea

Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea 520 JOURNAL OF SOFTWARE, VOL. 8, NO. 3, MARCH 2013 Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea Sangsik Lee 1, Donghyun Choi 2, Dongho Won 2 and Seungjoo Kim

More information

Information Security Skills: A Comparison Of What Is Used And What Is Taught

Information Security Skills: A Comparison Of What Is Used And What Is Taught 1 Information Security Skills: A Comparison Of What Is Used And What Is Taught Albert L. Fundaburk SH 239 Bloomsburg University Bloomsburg, PA 17815 Ph. (570) 389-9621 Fax (570) 389-3892 Email afundabr@bloomu.edu

More information

A Study of Design Measure for Minimizing Security Vulnerability in Developing Virtualization Software

A Study of Design Measure for Minimizing Security Vulnerability in Developing Virtualization Software A Study of Design Measure for Minimizing Security Vulnerability in Developing Virtualization Software 1 Mi Young Park, *2 Yang Mi Lim 1, First Author Science and Technology Policy Institute,ollive@stepi.re.kr

More information

Studying an Edutainment Applying Information Security Damage Cases for Adolescents

Studying an Edutainment Applying Information Security Damage Cases for Adolescents , pp.13-17 http://dx.doi.org/10.14257/astl.2014.52.03 Studying an Edutainment Applying Information Security Damage Cases for Adolescents Ryu-Hui Kim 1, Kyeong-Bin Moon 1 and Seong Baeg Kim 1,1, 1 Dept.

More information

Korea s experience of massive DDoS attacks from Botnet

Korea s experience of massive DDoS attacks from Botnet Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview

More information

Effectiveness of Flipped learning in Project Management Class

Effectiveness of Flipped learning in Project Management Class , pp. 41-46 http://dx.doi.org/10.14257/ijseia.2015.9.2.04 Effectiveness of Flipped learning in Project Management Class Jeong Ah Kim*, Hae Ja Heo** and HeeHyun Lee*** *Department of Computer Education

More information

DATA ANALYSIS. QEM Network HBCU-UP Fundamentals of Education Research Workshop Gerunda B. Hughes, Ph.D. Howard University

DATA ANALYSIS. QEM Network HBCU-UP Fundamentals of Education Research Workshop Gerunda B. Hughes, Ph.D. Howard University DATA ANALYSIS QEM Network HBCU-UP Fundamentals of Education Research Workshop Gerunda B. Hughes, Ph.D. Howard University Quantitative Research What is Statistics? Statistics (as a subject) is the science

More information

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data , pp. 169-178 http://dx.doi.org/10.14257/ijsh.2014.8.6.16 A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data Eun-Jee Song 1 and

More information

Security Measures of Personal Information of Smart Home PC

Security Measures of Personal Information of Smart Home PC , pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate

More information

Information Security in the undergraduate curriculum

Information Security in the undergraduate curriculum Information Security in the undergraduate curriculum Chris Mitchell Royal Holloway, University of London www.isg.rhul.ac.uk/~cjm 1 Background I Some years ago, computer hacking was mainly done for fun.

More information

Design and Analysis of Mobile Learning Management System based on Web App

Design and Analysis of Mobile Learning Management System based on Web App , pp. 417-428 http://dx.doi.org/10.14257/ijmue.2015.10.1.38 Design and Analysis of Mobile Learning Management System based on Web App Shinwon Lee Department of Computer System Engineering, Jungwon University,

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

Kyung Kim. PhD candidate (ABD), in Learning, Design, and Technology. College of Education. Pennsylvania State University. University Park, PA, USA

Kyung Kim. PhD candidate (ABD), in Learning, Design, and Technology. College of Education. Pennsylvania State University. University Park, PA, USA Kyung Kim/ 1 Kyung Kim Ph.D. Candidate, in Learning, Design, and Technology College of Education The Pennsylvania State University University Park, PA, 16802 Email: kxk997@psu.edu EDUCATION Pennsylvania

More information

Electric Power Engineering Education in Korea: Status Report

Electric Power Engineering Education in Korea: Status Report Electric Power Engineering Education in Korea: Status Report C. J. Kim, Member, IEEE Department of Electrical Engineering Howard University 2300 6 th St. NW Washington, DC 20059 ckim@howard.edu Abstract:

More information

Texas Agricultural Science Teachers Attitudes toward Information Technology. Dr. Ryan Anderson Iowa State University

Texas Agricultural Science Teachers Attitudes toward Information Technology. Dr. Ryan Anderson Iowa State University Texas Agricultural Science Teachers Attitudes toward Information Technology ABSTRACT Dr. Ryan Anderson Iowa State University Dr. Robert Williams Texas A&M- Commerce The researchers sought to find the Agricultural

More information

The Study on Business Ecosystem Analysis based on the Big Data Environment

The Study on Business Ecosystem Analysis based on the Big Data Environment , pp. 345-352 http://dx.doi.org/10.14257/ijca.2015.8.9.33 The Study on Business Ecosystem Analysis based on the Big Data Environment Hwan-Seok Yang Dept. of Information Security Engineering, Joongbu University

More information

UNIVERSITY FACULTY RESUME JANUARY 2014

UNIVERSITY FACULTY RESUME JANUARY 2014 I. Personal Information: UNIVERSITY FACULTY RESUME JANUARY 2014 Name: Hyung-Jin (Michael) Park Rank, Tenure Status: Associate Professor, Tenured Campus Address: 118 Business Administration Building Citizenship

More information

Defense in Depth Architecture of Server Systems for the Improvement of Cyber Security

Defense in Depth Architecture of Server Systems for the Improvement of Cyber Security , pp. 261-266 http://dx.doi.org/10.14257/ijsia.2014.8.3.27 Defense in Depth Architecture of Server Systems for the Improvement of Cyber Security Hanseong Son 1 and Soongohn Kim 2* 1 Department of Game

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Department of Information and Computer Engineering

Department of Information and Computer Engineering Department of Information and Computer Engineering Agenda College of Information Technology Department of Information and Computer Engineering Global IT Track 2 Departments, Students, Faculty Members Departments

More information

Effects of Emergency Nursing Simulation-based Education Program for Self-directed learning ability and Confidence in performance

Effects of Emergency Nursing Simulation-based Education Program for Self-directed learning ability and Confidence in performance , pp.146-150 http://dx.doi.org/10.14257/astl.2015.103.32 Effects of Emergency Nursing Simulation-based Education Program for Self-directed learning ability and Confidence in performance In-hye Song 1,

More information

The Bayesian Network Methodology for Industrial Control System with Digital Technology

The Bayesian Network Methodology for Industrial Control System with Digital Technology , pp.157-161 http://dx.doi.org/10.14257/astl.2013.42.37 The Bayesian Network Methodology for Industrial Control System with Digital Technology Jinsoo Shin 1, Hanseong Son 2, Soongohn Kim 2, and Gyunyoung

More information

The Study of Copper Resource Management System and Process for Effectively Operation

The Study of Copper Resource Management System and Process for Effectively Operation The Study of Copper Resource Management System and Process for Effectively Operation Sungmo Jung, Yangsok Kim, Seoksoo Kim Department of multimedia, Hannam University, Korea School of Computing, University

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

DONGBIN KIM. Bachelor of Arts Department of Humanities, French Language and Literature (major), Education (minor) Korea University, Seoul, Korea, 1990

DONGBIN KIM. Bachelor of Arts Department of Humanities, French Language and Literature (major), Education (minor) Korea University, Seoul, Korea, 1990 DONGBIN KIM EDUCATION Doctor of Philosophy Graduate School of Education and Information Studies Higher Education and Organizational Change (Specialty: Higher Education Policy) University of California,

More information

Strategy to maximize Mobile Advertising Effect in Smart Environment: Focused on DuCoffe model and TAM

Strategy to maximize Mobile Advertising Effect in Smart Environment: Focused on DuCoffe model and TAM Strategy to maximize Mobile Advertising Effect in Smart Environment: Focused on DuCoffe model and TAM Yong Beom Kim¹, Yongik Yoon², Yongwon Kim³ and Bong Gyou Lee 4 * 1 Korea Polytechnic University, 2

More information

Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices

Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices , pp.28-32 http://dx.doi.org/10.14257/astl.2015.109.07 Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices Byung-Rae Cha 1, Sang-Hun Lee 2, Soo-Bong

More information

The Effect of the After-School Reading Education Program for Elementary School on Multicultural Awareness

The Effect of the After-School Reading Education Program for Elementary School on Multicultural Awareness , pp.369-376 http://dx.doi.org/10.14257/ijunesst.2015.8.12.37 The Effect of the After-School Reading Education Program for Elementary School on Multicultural Awareness Jaebok Seo 1 and Mina Choi 2 1,2

More information

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace , pp.137-146 http://dx.doi.org/10.14257/ijseia.2014.8.9.11 Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace Jung ho Eom Military Studies, Daejeon University, 62 Daehakro,

More information

Authentication Methods for USIM-based Mobile Banking Service

Authentication Methods for USIM-based Mobile Banking Service Authentication Methods for USIM-based Mobile Banking Service Jonghyun Baek 1, Young-Jun Kim 1, Yoojae Won 1, HeungYoul Youm 2 Korea Information Security Agency, Seoul, Korea 1 Soon Chun Hyang University,

More information

The importance of using marketing information systems in five stars hotels working in Jordan: An empirical study

The importance of using marketing information systems in five stars hotels working in Jordan: An empirical study International Journal of Business Management and Administration Vol. 4(3), pp. 044-053, May 2015 Available online at http://academeresearchjournals.org/journal/ijbma ISSN 2327-3100 2015 Academe Research

More information

An Overview of Korea Information Security Stats

An Overview of Korea Information Security Stats An Overview of Korea Information Security Stats - With the focus on the secure server stats Gee, Sang-Ho Senior Researcher of KISA Korea Information Security Agency Korea Information Security Stats at

More information

Fast Device Discovery for Remote Device Management in Lighting Control Networks

Fast Device Discovery for Remote Device Management in Lighting Control Networks J Inf Process Syst, Vol.11, No.1, pp.125~133, March 2015 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in

More information

How To Test A Robot Platform And Its Components

How To Test A Robot Platform And Its Components An Automated Test Method for Robot Platform and Its Components Jae-Hee Lim 1, Suk-Hoon Song 1, Jung-Rye Son 1, Tae-Yong Kuc 2, Hong-Seong Park 3, Hong-Seok Kim 4 1,2 School of Information and Communication,

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali vincent.museminali@rura.rw Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

2 Fl. 1299-5 Bongdoek 1-Dong, Nam-ku, Daegu SOUTH KOREA Tel.: +82-53-474-9455 Fax: +82-53-474-9457 E-mail: ewha86@physio.co.kr Web: physio.co.

2 Fl. 1299-5 Bongdoek 1-Dong, Nam-ku, Daegu SOUTH KOREA Tel.: +82-53-474-9455 Fax: +82-53-474-9457 E-mail: ewha86@physio.co.kr Web: physio.co. Registered to ISO 9001:2000 2 Fl. 1299-5 Bongdoek 1-Dong, Nam-ku, Daegu SOUTH KOREA Tel.: +82-53-474-9455 Fax: +82-53-474-9457 E-mail: ewha86@physio.co.kr Web: physio.co.kr In partnership with BIOPAC since

More information

Crime Hotspots Analysis in South Korea: A User-Oriented Approach

Crime Hotspots Analysis in South Korea: A User-Oriented Approach , pp.81-85 http://dx.doi.org/10.14257/astl.2014.52.14 Crime Hotspots Analysis in South Korea: A User-Oriented Approach Aziz Nasridinov 1 and Young-Ho Park 2 * 1 School of Computer Engineering, Dongguk

More information

A study of Emotional Intelligence and Coping Strategies in Baccalaureate Nursing Students

A study of Emotional Intelligence and Coping Strategies in Baccalaureate Nursing Students , pp.275-282 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.29 A study of Emotional Intelligence and Coping Strategies in Baccalaureate Nursing Students Mi-Ran Kim 1 and Su-Jeong Han 2 * 1,2 Konyang University,

More information

A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification

A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification , pp. 131-142 http://dx.doi.org/10.14257/ijseia.2015.9.10.13 A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification Min-gyu Lee 1, Hyo-jung Sohn 2, Baek-min Seong

More information

Trends and Patterns of Public Information Disclosure in Korean Government

Trends and Patterns of Public Information Disclosure in Korean Government Trends and Patterns of Public Information Disclosure in Korean Government Myoung Jin Lee Doctoral Candidate Yousei University Department of Public Administration E-mail: zinh@yonsei.ac.kr M. Jae Moon Underwood

More information

Assessing CRM indicators effects on creating brand image at health care services

Assessing CRM indicators effects on creating brand image at health care services Available online at www.behaviorsciences.com Reef Resources Assessment and Management Technical Paper ISSN: 16077393 RRAMT 2013 Vol. 38(2), 2013, 5 Assessing CRM indicators effects on creating brand image

More information

Implementation of Graphic Based Network Intrusion Detection System for Server Operation

Implementation of Graphic Based Network Intrusion Detection System for Server Operation , pp.37-48 http://dx.doi.org/10.14257/ijsia.2015.9.2.05 Implementation of Graphic Based Network Intrusion Detection System for Server Operation Jun-Ho Huh*, Donghoon Lee* and Kyungryong Seo* * Dept. of

More information

The Educational Status of College-level Photography-related Courses

The Educational Status of College-level Photography-related Courses , pp.186-191 http://dx.doi.org/10.14257/astl.2015.103.40 The Educational Status of College-level Photography-related Courses Minung Kim 21, Maebong-ro 4ga-gil, Dongjak-gu,#156830,Seoul, Korea cjsea618@gmail.com

More information

Effects of Simulation-based Education on Communication Skill and Clinical Competence in Maternity Nursing Practicum

Effects of Simulation-based Education on Communication Skill and Clinical Competence in Maternity Nursing Practicum 여성건강간호학회지 제18권 제4호, 2012년 12월 Korean J Women Health Nurs Vol. 18 No. 4, 312-320, December, 2012 pissn 2287-1640 eissn 2093-7695 http://dx.doi.org/10.4069/kjwhn.2012.18.4.312 Effects of Simulation-based

More information

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics

More information

Energy Monitoring and Management Technology based on IEEE 802.15. 4g Smart Utility Networks and Mobile Devices

Energy Monitoring and Management Technology based on IEEE 802.15. 4g Smart Utility Networks and Mobile Devices Monitoring and Management Technology based on IEEE 802.15. 4g Smart Utility Networks and Mobile Devices Hyunjeong Lee, Wan-Ki Park, Il-Woo Lee IT Research Section IT Convergence Technology Research Laboratory,

More information

Design of Media measurement and monitoring system based on Internet of Things

Design of Media measurement and monitoring system based on Internet of Things Design of Media measurement and monitoring system based on Internet of Things Hyunjoong Kang 1, Marie Kim 1, MyungNam Bae 1, Hyo-Chan Bang 1, 1 Electronics and Telecommunications Research Institute, 138

More information

Computer Security Courses/Programs

Computer Security Courses/Programs Minneapolis, MN. Computer Security Courses/Programs Developed at Metropolitan State University Jigang Liu Department of Information and Computer Sciences College of Arts and Sciences Metropolitan State

More information

PROGRAMME DEVELOPMENT UNIT

PROGRAMME DEVELOPMENT UNIT PROGRAMME DEVELOPMENT UNIT BUILDING THE NATIONAL QUALIFICATIONS FRAMEWORK AT INSTITUTIONAL LEVEL The Programme Development Unit in the Office of the Vice-Rector: Academic Affairs and Research has overall

More information

How To Get A Degree In Armenian Higher Education

How To Get A Degree In Armenian Higher Education Programmes Taught in ENGLISH at Armenian Higher Education Institutions HIGHER EDUCATION INSTITUTION BA Programme(s) Name: Armenian State University of Economics Acronym: ASUE www.asue.am Name: Bachelor

More information

A Study on Cooperative System between Devices to Construct Internet of Things

A Study on Cooperative System between Devices to Construct Internet of Things , pp. 83-90 http://dx.doi.org/10.14257/ijsh.2015.9.11.10 A Study on Cooperative System between Devices to Construct Internet of Things Chang-Su Kim 1, Sang-Keun Yoo 2, Young-Sic Jeong 2, Yong-Woon Kim

More information

Nursing Informatics Preparedness of Graduate Nurses in Calabar, Nigeria

Nursing Informatics Preparedness of Graduate Nurses in Calabar, Nigeria International Journal of Humanities Social Sciences and Education (IJHSSE) Volume, Issue 9, September 015, PP 159-168 ISS 349-0373 (Print) & ISS 349-0381 (Online) www.arcjournals.org ursing Informatics

More information

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks , pp. 205-216 http://dx.doi.org/10.14257/ijseia.2015.9.9.18 Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks Rae Hyun Kim and Jeong Gon Kim 1 Department of Electronic

More information

A Study among Chinese Tourists in their 20s and 30s for Determining their Choice of Medical Tourism Destinations

A Study among Chinese Tourists in their 20s and 30s for Determining their Choice of Medical Tourism Destinations , pp.13-20 http://dx.doi.org/10.14257/ijunesst.2015.8.9.02 A Study among Chinese Tourists in their 20s and 30s for Determining their Choice of Medical Tourism Destinations Mi Joon Lee 1, In Soon Min 2

More information

Cyber Security: Protecting your business from attack

Cyber Security: Protecting your business from attack Cyber Security: Protectig your busiess from attack Breakfast Busiess Semiars, Autum 2015 Wedesday 14 October 2015 Build your busiess with our Autum semiars Wedesday 14 October: Cyber Security Wedesday

More information

Fast Fuzzy Control of Warranty Claims System

Fast Fuzzy Control of Warranty Claims System Journal of Information Processing Systems, Vol.6, No.2, June 2010 DOI : 10.3745/JIPS.2010.6.2.209 Fast Fuzzy Control of Warranty Claims System Sang-Hyun Lee*, Sung Eui Cho* and Kyung-li Moon** Abstract

More information

A Study on the Influence of Use of Web 2.0 Collaboration Tool Reflecting Agile Practice on the Evaluation of OS Project

A Study on the Influence of Use of Web 2.0 Collaboration Tool Reflecting Agile Practice on the Evaluation of OS Project , pp. 11-18 http://dx.doi.org/10.14257/ijsh.2015.9.11.02 A Study on the Influence of Use of Web 2.0 Collaboration Tool Reflecting Agile Practice on the Evaluation of OS Project Hyo-jung Sohn 1, Min-gyu

More information

Curriculum Vitae Yoon Jik Cho

Curriculum Vitae Yoon Jik Cho Curriculum Vitae Yoon Jik Cho Associate Professor Yonsei University Address and Contact Yeonhee Hall 316, Yonsei University Office: 02-2123-5957 50 Yonsei-ro, Seodaemun-gu Fax: 02-2123-8118 Seoul, South

More information

A Research on the English for Engineering Students Course Based on Needs Analysis in Korea

A Research on the English for Engineering Students Course Based on Needs Analysis in Korea A Research on the English for Engineering Students Course Based on Needs Analysis in Korea Hyun Hyo Kim Kongju National University, Korea hhkim@kongju.ac.kr Abstract. As Korea has been implementing export-oriented

More information

Analysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey

Analysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey , pp.65-74 http://dx.doi.org/10.14257/ijunesst.2015.8.10.07 Analysis of Regression Based on Sampling Weights in Complex Sample Survey: Data from the Korea Youth Risk Behavior Web- Based Survey Haewon Byeon

More information

PERFORMANCE ANALYSIS OF HYBRID FORECASTING MODEL IN STOCK MARKET FORECASTING

PERFORMANCE ANALYSIS OF HYBRID FORECASTING MODEL IN STOCK MARKET FORECASTING PERFORMANCE ANALYSIS OF HYBRID FORECASTING MODEL IN STOCK MARKET FORECASTING Mahesh S. Khadka*, K. M. George, N. Park and J. B. Kim a Department of Computer Science, Oklahoma State University, Stillwater,

More information

DIRECTORATE OF HUMAN RESOURCES OFFICE OF THE DIRECTOR EMPLOYMENT OPPORTUNITIES:

DIRECTORATE OF HUMAN RESOURCES OFFICE OF THE DIRECTOR EMPLOYMENT OPPORTUNITIES: MAKERERE P.O. Box 7062 Kampala Uganda Cables MAKUNIKA UNIVERSITY Telephone: 256-41-530295/531410 E.mail: hrd@admin.mak.ac.ug DIRECTORATE OF HUMAN RESOURCES OFFICE OF THE DIRECTOR EMPLOYMENT OPPORTUNITIES:

More information

Biomarker Discovery and Data Visualization Tool for Ovarian Cancer Screening

Biomarker Discovery and Data Visualization Tool for Ovarian Cancer Screening , pp.169-178 http://dx.doi.org/10.14257/ijbsbt.2014.6.2.17 Biomarker Discovery and Data Visualization Tool for Ovarian Cancer Screening Ki-Seok Cheong 2,3, Hye-Jeong Song 1,3, Chan-Young Park 1,3, Jong-Dae

More information

Master Program «Measurement in Psychology and Education»: First Outcomes and Further Steps. National Research University Higher School of Economics

Master Program «Measurement in Psychology and Education»: First Outcomes and Further Steps. National Research University Higher School of Economics Master Program «Measurement in Psychology and Education»: First Outcomes and Further Steps National Research University Higher School of Economics Resources: Starting position Some human capacity in area

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information

Where do Faculty Receive their PhDs? A Comparison Across Six Disciplines

Where do Faculty Receive their PhDs? A Comparison Across Six Disciplines Where do Faculty Receive their PhDs? A Comparison Across Six Disciplines Stephen Wu Hamilton College July 2004 Abstract This paper studies the doctoral origins of faculty at top research universities and

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

1. Introduction. Abstract

1. Introduction. Abstract Vol.6, No. 6 (2014), pp.129-134 http://dx.doi.org/10.14257/ijbsbt.2014.6.6.13 A Study on the Medical Dispute Experience and Educational Needs of Dental Hygienists According to Expansion of Health Insurance

More information

DEVELOPING THE KNOWLEDGE MANAGEMENT SYSTEM BASED ON BUSINESS PROCESS

DEVELOPING THE KNOWLEDGE MANAGEMENT SYSTEM BASED ON BUSINESS PROCESS DEVELOPING THE KNOWLEDGE MANAGEMENT SYSTEM BASED ON BUSINESS PROCESS Sung Ho Jung 1, Ki Seok Lee 1, Young Woong Song 2, Hyoung Chul Lim 3, and Yoon Ki Choi 4 * 1 Ph.D., Candidate, Department of Architectural

More information

Big Data Collection Study for Providing Efficient Information

Big Data Collection Study for Providing Efficient Information , pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and

More information

Copula model estimation and test of inventory portfolio pledge rate

Copula model estimation and test of inventory portfolio pledge rate International Journal of Business and Economics Research 2014; 3(4): 150-154 Published online August 10, 2014 (http://www.sciencepublishinggroup.com/j/ijber) doi: 10.11648/j.ijber.20140304.12 ISS: 2328-7543

More information

Faculty compensation is a vital issue,

Faculty compensation is a vital issue, THE NEA 2002 ALMANAC OF HIGHER EDUCATION 11 Faculty Salaries: Recent Trends by Suzanne B. Clery and John B. Lee Suzanne B. Clery is a senior research associate at JBL Associates, Inc., a Bethesda, Maryland,

More information

USING ONLINE JOB POSTINGS TO ANALYZE DIFFERENCES IN SKILL REQUIREMENTS OF INFORMATION SECURITY CONSULTANTS: SOUTH KOREA VERSUS UNITED STATES

USING ONLINE JOB POSTINGS TO ANALYZE DIFFERENCES IN SKILL REQUIREMENTS OF INFORMATION SECURITY CONSULTANTS: SOUTH KOREA VERSUS UNITED STATES USING ONLINE JOB POSTINGS TO ANALYZE DIFFERENCES IN SKILL REQUIREMENTS OF INFORMATION SECURITY CONSULTANTS: SOUTH KOREA VERSUS UNITED STATES Sung-Kyu Park, Department of Information Security Management,

More information

A Comparative Analysis on the Outcomes of Synchronous and Asynchronous Online International Educational Exchange

A Comparative Analysis on the Outcomes of Synchronous and Asynchronous Online International Educational Exchange , pp.62-67 http://dx.doi.org/10.14257/astl.2015.92.13 A Comparative Analysis on the Outcomes of Synchronous and Anous Online International Educational Exchange Jong-Yeon Lee 1, Sang Hoon Park 2, Min Jung

More information

An Empirical Analysis on the Performance Factors of Software Firm

An Empirical Analysis on the Performance Factors of Software Firm , pp.121-132 http://dx.doi.org/10.14257/ijseia.2014.8.7,10 An Empirical Analysis on the Performance Factors of Software Firm Moon-Jong Choi, Jae-Won Song, Rock-Hyun Choi and Jae-Sung Choi #3-707, DGIST,

More information

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding

More information