메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학술저널
저자정보
Yun Il-hyun (Gwangju University Gwangju Republic of Korea)
저널정보
J-INSTITUTE Protection Convergence Protection Convergence Vol.1 No.1
발행연도
2016.6
수록면
23 - 30 (8page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색

초록· 키워드

오류제보하기
Social workers are based, including the professional skills and experience they have. The professionals who are professionally addressed with respect to interact with individuals, families and communities with life on the difficulty or problem. Social workers and ensure a comprehensive and professional information about them. Information with a social worker it is very important to the individual level, family level there, the group level, the community level. And are resources that can give serious damage. It is very important to ensure professionalism and ethics professional knowledge about information security as a prerequisite. Social workers should learn the professional knowledge and skills in social work practice based on high ethical. This learning can be made from the University of Social Welfare Training begins. Therefore, the information security training for social workers shall be made from the university. The purpose of this study is to provide basic information for information security training of social workers. An Empirical Study on Republic of Korea Information Security Convergence-type Latent means Analysis of Social Welfare average presence and gender differences. Information security configuration parameters are information security act, information security education, information security behavior. Personal information is information security behavior is not experienced, optimistic bias in information security, technical understanding of information security, and understanding of information security threats. The study is the welfare of students majoring in Gwangju University students and Non - Major Students. The samples of this study were carried out three weeks from March 05, 2016 using a non-probability sampling methods. Self-report questionnaire was used to survey. 317 people were targets except one respondent insincere. Target of the lion male 106 people(33.4%) were female students, 211 people(66.6%). Social work majors are 149 people(47.0%), Non - Major Students was(53.0%). This study applies the correlation analysis, multi-group analysis and latent mean analysis. The results of this study were as follows. First, personal experience, optimistic bias, the difference between groups for the presence gender and social groups majoring in structural relationships of technical understanding, understanding of threats, information security education, information security and information security for the action showed that. The difference was not great. Second, women's groups and major groups personal experience in information security, optimism bias, higher education technological understanding is increasing security information, and information security Information security is high, the action showed that high. Third, it was a personal experience, optimistic bias, technical understanding, and understanding of information security threats education, the difference between groups according to the presence or absence Gender and Social Welfare in the structure of the relationship between information security acts on information security. Fourth, the need for women and social welfare groups in major information security education was relatively high. Many women relative to men majors than social welfare, information security education is very important when considering the proportion of women in the social welfare field. Therefore, the information security courses shall be established on social welfare majors. In addition, you should enable information security education based on ethics for social welfare information security and personal security.

목차

등록된 정보가 없습니다.

참고문헌 (19)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0