2018
DOI: 10.1007/978-3-319-98693-7_1
|View full text |Cite
|
Sign up to set email alerts
|

The Analysis of the Appropriateness of Information Education Curriculum Standard Model for Elementary School in Korea

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Moreover, various measures are needed to cope with cyberbullying. For example, there are policies that legally rescue victims, psychotherapy, cybercrime reporting, and counseling services [50][51][52][53]. However, most importantly, it is essential to raise students' awareness of cyber ethics and cyberbullying awareness through education.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, various measures are needed to cope with cyberbullying. For example, there are policies that legally rescue victims, psychotherapy, cybercrime reporting, and counseling services [50][51][52][53]. However, most importantly, it is essential to raise students' awareness of cyber ethics and cyberbullying awareness through education.…”
Section: Discussionmentioning
confidence: 99%
“…RBAC has some advantages: it is possible to include the organizational structure in the security policy more simply and efficiently with roles, role classes, restrictions, and so on, to form efficient policies with the natural assignment of access authority, and to flexibly deal with frequent changes in authority thanks to its link to the roles rather than the users. However, some information, such as the time or location of occurrence of an access request or other situational information, is difficult to include in the access control policy because RBAC focuses on users and roles, and is not suitable for ubiquitous environments in which access policies should be adjusted for the surroundings 31,32 . Figure 3 provides a brief overview of the overall flow of RBAC.…”
Section: Related Researchmentioning
confidence: 99%
“…However, some information, such as the time or location of occurrence of an access request or other situational information, is difficult to include in the access control policy because RBAC focuses on users and roles, and is not suitable for ubiquitous environments in which access policies should be adjusted for the surroundings. 31,32 Figure 3 provides a brief overview of the overall flow of RBAC.…”
Section: Role-based Access Controlmentioning
confidence: 99%
“…In addition, Petri et al (2016) emphasized the importance of real-time tracking in the global supply chain configured by multiple participants and proposed a system for real-time tracking of supply chains and logistics involving multiple participants. This study conducted a study of reliable systems by receiving information about supply chain and logistics in real time through RFID and providing transaction records with enhanced integrity by using the block chain [14][15][16].…”
Section: Introductionmentioning
confidence: 99%