All Articles

Class Model of Child SAFETY Education Applied to the Flipped Learning Method

Vol.2 (No.2) 2017
Author
admin
Date
2017-06-30 11:28
Views
187

Abstract


In teaching safety education to young children, early childhood teachers not only have to consider the use of safety issues related to young children as part of a useful strategy, but also the age of the children and various teaching methods. After the teachers recognize the importance of safety education, they have to perform and plan the actual safety education methods based on safety concepts and basic theories. For this reason, it is essential to plan and teach safety education based on the age of the children for pre-service teachers in order to prevent contingent safety accidents in pre-service education.
In this thesis, I am going to design a child safety education for the flipped learning method in order to supplement the traditional lecture method. According to flipped learning, it is possible to understand theories completely by providing learning materials(e.g., various practical samples) in pre-class and develop the pre-service teachers’ ability of dealing with accidents and caring for the safety of the children by extending practice hours for planning and conducting various safety education based on the background of theory that was acquired in pre-class.
The characteristics of the class model of child safety education applied in the flipped learning method are as follows. First, a total of 4 topics are included in the flipped learning method, except for theory lessons and field trips, with regard to the overall design of the child safety education class, safety education on traffic and fire, which occur frequently during childhood period, and environment and media safety education, which are correctly oriented. Second, pre-class step provides study materials(e.g., various practical cases) to pre-service teachers for a better understanding theories, and simple quizzes to pre-service teachers for checking themselves if they understood the contents or not. Third, in-class step develops a cooperative relationship among the parties in PBL and debate cases. For the successful implementation of the flipped learning method, teaching activities are planned and performed based on a child-centered learning method. PBL learning includes searching for data, preparing a teaching plan suitable for children’s developmental characteristics, providing teaching materials, and teaching safety education after providing actual safety situations. Debate learning focuses on decision making regarding the roles and conducting discussions with a logical basis after providing the topics, such as value judgment. It also evaluates the other team’s debate after providing a specific valuation basis. Fourth, the post-class step manages the team’s weak points result from a portfolio feedback. According to the child safety education applied to the flipped learning method, pre-service teachers will be able to extend their ability on safety management and handling dangerous situations related to the safety of the children.

Keyword:Children, Safety, Flipped-Learning, PBL, DEBATE
  • This study focused on the role of the bystander in the school violence situation and tried to understand the choices of the bystander by applying “Theory of Planned Behavior”. In school violence situations, there are bystanders in addition to bullies and victims, and bystanders play significant roles in the situation. Sometimes their choices can determine the outcome of the school violence. According to TPB(behavior, intention, attitude, subjective norms and perceived behavioral control), the reasons why they choose to be an outsider rather than a defender can be interpreted as follows. They perceive the indifferent behaviors of a bystander and its results as positive and believe that others around will remain outsiders. Also, there is no difficulty in being a bystander, as it does not require an active action. On the other hand, they do not show the behavior of defenders because they perceive the defender's behavior and its result as negative, believe that the students in a classroom have the norm against the defender's behavior. Even if they want to take an action, they do not know what to do. And they may not be confident in taking an action even when they know what to do. In order to resolve school violence, the bystanders should respond effectively to the situation as defenders of victims. To this end, it is necessary to actively utilize the result of verifying bystander selection in school violence applying TPB. In particular, we must improve students’ attitudes toward the outsiders’ and defenders’ behaviors and the behavioral outcomes. And Concrete and explicit norms for helping behaviors should be built in their classroom. Finally, we need to inform students how to help victims and improve their confidence in those behaviors. So, we will be able to solve school violence problems by reducing outsiders and increasing defenders when designing and operating an anti-bullying program based on the TPB in the school environment.
    Keyword:Crisis, Theory of Planned Behavior, School Violence, Bullying, Bystander
  • Purpose; This paper intends to develop evaluation indicators of safety education for the Republic of Kore Army(ROKA) personnel. In Korea, there are a lot of accidents and disasters that Korean people had never been experienced including earthquakes, fire casualties, and marine accidents. There are many physical and psychological risk factors including explosion, injury, fire, traffic accident, and psychological violence, etc. Researchers suggest that ROKA soldiers are vulnerable to daily risk factors but do not receive enough safety education due to the lack of appropriate manual, instructor, and time. This study thoroughly reviewed the literature including the US Army field manual on the safety education and studies of industrial safety. Seventeen areas of safety management in the military bases were described in the field manual and counter-measures of each area were reviewed. Thirty evaluative indicators were presented based on the literature review and the value of each indicator was suggested as a milestone for designing and conducting the safety education. The 30 indicators are composed based on the CIPP(context-input-process-product) model and each of the indicator implies theoretical meanings and practical suggestions. The indicators begin with analyzing the hazard of the workplace and they contain : (1)collecting and analyzing the hazards in the workplace, (2)collecting and analyzing the information about the health management system, (3)making the safety management plan in the workplace, (4)reflecting the opinions of military personnel in making the safety management plan, (5)investigating the implementation of health education and evaluation for military personnel, (6)reflecting the military personnel’s need for health and safety education, (7)evaluating the leader’s interest in the safety and health promotion, (8)investigating the military personnel's consciousness of safety, (9)employment of officer in charge of safety management, (10)percentage of the officers in charge of the safety management, (11)employment of the officers in charge of safety and health education, (12)qualification of the officers in charge of the safety and health education, (13)presence of department of safety and health management and education, (14)volume of contents of the safety and health education, (15)Percentage of budget for safety and health education, (16)implementation of regulations on safety and health, (17)specification of educational objectives on safety, (18)review of the appropriateness of the safety education objectives, (19)diversity of educational method for the safety education, (20)specification of the safety education contents, (21)implementation of the educational plan, (22)checking the military personnel's awareness of the safety objectives, (23)the military personnel's satisfaction in the safety education, (24)participation of the military personnel in the safety education, (25)availability of resources for the safety education, (26)communication about the contents of the safety education, (27)changes in the consciousness of the safety, (28)changes in the knowledge of the safety, (29)changes in the attitude toward the safety, (30)changes in the real actions in the safety management and implementation.
    Keyword:Safety, Republic of Korea Army, Safety Education, Evaluation, Indicator
  • With radical development of information and communication Technology, Internet of Things(IoT) era has come. All the things around us are connected through internet so that it enables objects to exchange data with connected devices and is expected to offer new advanced services that goes beyond the value where each existing objects could have offered respectively. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countless objects. However, traditional security systems including intrusion detection systems(IDSs), firewalls(FWs), anti-viruses(A/Vs), etc., focus on low level attack or anomalies, and raise alerts independently. And IoT services have different types of security frameworks. As a result, it is difficult for human security manager or attack response systems to understand the alerts and take appropriate actions. In this paper describes the analysis of security methods in the area of IoT and describes a mechanism that analyzes logs generated by IoT devices attacks. Data collected from the lightweight application is sent to the network component for further analysis. The collaborative component is used for collecting data in the distributed network and indicates the possible attacks. Also this paper suggests enterprise security management including IoT services which are based on distributed environments, and presents a practical technique to address this issue, and introduces Event Correlation Model(ECM) which is a simple free text causal language. We show how the concept of class in object-oriented methodology is used to provide scalability to our approach. Graph and coding theories are used for correlation.
    Keyword:Safety of IoT Services, Network Security Management, Enterprise Security Management, Log Analysis, Event Correlation
  • The purpose of this study was to overcome the nursing staff shortage crisis at small and medium sized hospitals by examining the mediation effects of organizational commitment and job satisfaction on the relationship between job stress and turnover intention. To do so, this study used Price’s voluntary turnover model and suggested an integrated model by exploring the moderated mediation effects of changes in self–efficacy. Methods: The survey was conducted with 344 nurses working at small to medium sized hospitals in C city. Data collection was conducted for two weeks, from June 1 to 15, 2016, and the collected data were analyzed using Hayes’ macro process models 4 and 8 in SPSS 22.0. Results: The findings indicated that organizational commitment and job satisfaction have indirect effects on the relationship between job stress and turnover intention. Self-efficacy was found to have a moderation effect between job stress and mediating variable pathways and also have a mediation effect on job satisfaction pathways. Conclusion: In order to reduce the turnover intention of nurses in small to medium sized hospitals, it is necessary to develop a practical self-efficacy improvement program and action plan for the nursing work place.
    Keyword:Nursing Crisis, Turnover Intention, Job Satisfaction, Organizational Commitment, Self-Efficacy
  • With radical development of information and communication Technology, Internet of Things(IoT) era has come. All the things around us are connected through internet so that it enables objects to exchange data with connected devices and is expected to offer new advanced services that goes beyond the value where each existing objects could have offered respectively. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countless objects. However, traditional security systems including intrusion detection systems(IDSs), firewalls(FWs), anti-viruses(A/Vs), etc., focus on low level attack or anomalies, and raise alerts independently. And IoT services have different types of security frameworks. As a result, it is difficult for human security manager or attack response systems to understand the alerts and take appropriate actions. In this paper describes the analysis of security methods in the area of IoT and describes a mechanism that analyzes logs generated by IoT devices attacks. Data collected from the lightweight application is sent to the network component for further analysis. The collaborative component is used for collecting data in the distributed network and indicates the possible attacks. Also this paper suggests enterprise security management including IoT services which are based on distributed environments, and presents a practical technique to address this issue, and introduces Event Correlation Model(ECM) which is a simple free text causal language. We show how the concept of class in object-oriented methodology is used to provide scalability to our approach. Graph and coding theories are used for correlation.
    Keyword:Safety of IoT Services, Network Security Management, Enterprise Security Management, Log Analysis, Event Correlation
  • The purpose of this study was to overcome the nursing staff shortage crisis at small and medium sized hospitals by examining the mediation effects of organizational commitment and job satisfaction on the relationship between job stress and turnover intention. To do so, this study used Price’s voluntary turnover model and suggested an integrated model by exploring the moderated mediation effects of changes in self–efficacy. Methods: The survey was conducted with 344 nurses working at small to medium sized hospitals in C city. Data collection was conducted for two weeks, from June 1 to 15, 2016, and the collected data were analyzed using Hayes’ macro process models 4 and 8 in SPSS 22.0. Results: The findings indicated that organizational commitment and job satisfaction have indirect effects on the relationship between job stress and turnover intention. Self-efficacy was found to have a moderation effect between job stress and mediating variable pathways and also have a mediation effect on job satisfaction pathways. Conclusion: In order to reduce the turnover intention of nurses in small to medium sized hospitals, it is necessary to develop a practical self-efficacy improvement program and action plan for the nursing work place.
    Keyword:Nursing Crisis, Turnover Intention, Job Satisfaction, Organizational Commitment, Self-Efficacy
  • With radical development of information and communication Technology, Internet of Things(IoT) era has come. All the things around us are connected through internet so that it enables objects to exchange data with connected devices and is expected to offer new advanced services that goes beyond the value where each existing objects could have offered respectively. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countless objects. However, traditional security systems including intrusion detection systems(IDSs), firewalls(FWs), anti-viruses(A/Vs), etc., focus on low level attack or anomalies, and raise alerts independently. And IoT services have different types of security frameworks. As a result, it is difficult for human security manager or attack response systems to understand the alerts and take appropriate actions. In this paper describes the analysis of security methods in the area of IoT and describes a mechanism that analyzes logs generated by IoT devices attacks. Data collected from the lightweight application is sent to the network component for further analysis. The collaborative component is used for collecting data in the distributed network and indicates the possible attacks. Also this paper suggests enterprise security management including IoT services which are based on distributed environments, and presents a practical technique to address this issue, and introduces Event Correlation Model(ECM) which is a simple free text causal language. We show how the concept of class in object-oriented methodology is used to provide scalability to our approach. Graph and coding theories are used for correlation.
    Keyword:Safety of IoT Services, Network Security Management, Enterprise Security Management, Log Analysis, Event Correlation
  • The purpose of this study was to overcome the nursing staff shortage crisis at small and medium sized hospitals by examining the mediation effects of organizational commitment and job satisfaction on the relationship between job stress and turnover intention. To do so, this study used Price’s voluntary turnover model and suggested an integrated model by exploring the moderated mediation effects of changes in self–efficacy. Methods: The survey was conducted with 344 nurses working at small to medium sized hospitals in C city. Data collection was conducted for two weeks, from June 1 to 15, 2016, and the collected data were analyzed using Hayes’ macro process models 4 and 8 in SPSS 22.0. Results: The findings indicated that organizational commitment and job satisfaction have indirect effects on the relationship between job stress and turnover intention. Self-efficacy was found to have a moderation effect between job stress and mediating variable pathways and also have a mediation effect on job satisfaction pathways. Conclusion: In order to reduce the turnover intention of nurses in small to medium sized hospitals, it is necessary to develop a practical self-efficacy improvement program and action plan for the nursing work place.
    Keyword:Nursing Crisis, Turnover Intention, Job Satisfaction, Organizational Commitment, Self-Efficacy
  • Purpose: This study conducted the exploration using the Colaizzi method, a phenomenological research method to identify the constituents of the experience of the SNB-program, one of Terahertz therapy, which is receiving much attention as a thermal treatment method recently. Method: The data collection method of the first study using the Colaizzi method consisted of literature review for theoretical extraction, narrative observation and interview. For the first analysis of the data, the Colaizzi 6-step analysis method, a phenomenological research method, was used to identify the participants' SNB-program experience and explore the constituent factors of the human body's natural healing experience. Second, a questionnaire was created based on the constituent factors of the participant's experience identified through in-depth interviews, and the principle component analysis of 123 questionnaires collected was conducted to verify the inner validity of the research results. Results: In the results of this study, the SNB-program experience was confirmed based on two categories such as positive experience and uncomfortable experience. In detail, eight types of uncomfortable experiences including eight physical changes, six emotional changes, five social education changes, and improvements were derived. In addition, to verify the validity and reliability of the extracted constituent factors, from the results of constructing preliminary items and conducting exploratory factor analysis, lastly, it was confirmed with two categories, five theme clusters, and 27 formulated meanings. Conclusion: In this study, the SNB-program participant's experience was verified in vivid language through the Colaizzi method, and the procedure was verified through social science analysis. The results of this study are meaningful in that the user's experience of thermotherapy using Terahertz waves has been generalized.
    Keyword:SNB-Program, Colaizzi Method, Health Intervention, Experience, Constituent Factors
  • Purpose: The study induced obesity in 50-week-old white rats with high fat intake for eight weeks. Then for 12 weeks, we analyzed how resistance exercise with anaerobic properties and fermented soybean ingestion with a nutritional approach affect the potential mechanisms underlying body composition, metabolic risk factors, and inflammatory cytokine of aortic tissue. Method: The experimental animals were randomly assigned to four groups: Control(Con), Soybean(Soy), Resistance Expense(Re), and Soybean + Resistance Expense(Soy+Resistance). For the resistance exercise, the ladder climbing is applied, and the soy supplement made up 24% of the total calories of soy protein. After eight weeks of high-fat diets, obesity was induced and treated for 12 weeks. The appearance of inflammatory cytokine was analyzed for IL-6, TNF-α, IL-10, and IL-4 in the aortic tissue. Results: In Soy and Soy+Re groups, the fat content decreased compared to those in Con and Re groups(Figure 2A), and body fat was higher in Soy and Soy+Re groups than in Con and Re groups. The appearance of IL-6 cytokine associated with infectious diseases showed significant differences in Soy, Re, and Soy+Re groups over Con groups(p <0.05). The appearance of other cytokine, such as TNF-α, IL-4, and IL-10, showed no significant differences between the groups. Conclusion: As a result, the positive effects of fermented soybean ingestion on changes in inflammatory factors associated with vascular inflammation cannot be clearly identified in improving the function in the aortic tissue. Therefore, since it cannot be seen as a positive effect, it is necessary to choose the intake and type according to the purpose of the ingestion and to apply it compiling prior studies and literature regarding the form, frequency, intensity, and time settings of exercise.
    Keyword:Resistance Exercise, Soybeans, Obesity, Metabolic Risk Factors, Inflammatory Cytokine