We may earn an affiliate commission when you visit our partners.
Course image
J. Alex Halderman

이 과정에서는 전자 투표 및 인터넷 투표의 보안 위협 및 향후 잠재적인 위협에 대해 시민들이 알아야 할 점에 대해 학습하게 됩니다. 우리는 선거 기술의 과거, 현재와 미래에 대해 살펴보고 컴퓨터 보안, 인적 요소, 공공 정책 등을 비롯하여 투표에 의해 나뉘는 여러 분야에 대해 알아볼 것입니다.

Enroll now

Two deals to help you save

We found two deals and offers that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

보안 문제로서의 투표
보안 마인드셋을 통한 투표 문제 접근
투표에서 활용되는 컴퓨터
컴퓨팅 시대로 접어든 투표
Read more
전세계의 보안 절차 및 투표
민주주의의 보안을 지키기 위한 방법
인적 요인과 인터넷 투표
투표 시에도 사용자는 항상 예상한 대로 움직이지 않습니다.
새로운 기술 및 정책
학습한 내용

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
학습자에게 투표 보안의 중요성을 인식시킵니다
선거 기술과 투표에서의 그 영향에 대해 설명합니다
투표 보안을 위한 다양한 절차와 관행을 살펴봅니다
민주주의와 선거의 보안을 유지하는 방법을 탐구합니다
유권자의 행동과 의사 결정 과정에 대해 다룹니다
새로운 투표 기술과 정책의 영향을 고려합니다

Save this course

Save 디지털 민주주의의 명암 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in 디지털 민주주의의 명암 with these activities:
투표 등록 지원
투표 등록 지원 활동에 참여하여 투표권 인식을 높이고 모든 사람이 투표권을 행사할 수 있도록 도와주세요.
Show steps
  • 투표 등록 단체 찾기
  • 지침 및 절차 숙지하기
  • 사람들과 소통하고 투표 등록 지원하기
해커와 사회 책 읽기
해커의 기술적 측면과 사회적 영향에 대한 흥미로운 통찰력을 제공하는 '해커와 사회' 책을 읽어 보안에 대한 인식을 넓히세요.
Show steps
  • 책 읽기
  • 핵심 개념과 아이디어 강조하기
  • 책의 주제를 투표 보안과 관련시켜 생각하기
peer 토론 그룹 참여
동료 학생들과 토론 그룹에 참여하여 다양한 관점을 듣고, 지식을 공유하고, 이해를 심화하세요.
Show steps
  • 관련 주제 또는 질문 선택하기
  • 그룹에 가입하고 참여하기
  • 의견 공유하고, 질문하기, 토론하기
Show all three activities

Career center

Learners who complete 디지털 민주주의의 명암 will develop knowledge and skills that may be useful to these careers:
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their computer networks and systems from security threats. This course may be useful to a Security Consultant by providing a deep understanding of the security risks associated with election systems.
Policy Analyst
Policy Analysts research, analyze, and make recommendations on public policy issues. This course may be useful to a Policy Analyst by providing a deep understanding of the security risks associated with election systems and the policy measures that can be taken to mitigate these threats.
Election Official
Election Officials oversee the administration of elections. This course may be useful to an Election Official by providing a comprehensive understanding of the security threats facing election systems and the measures that can be taken to mitigate these threats.
Network Security Engineer
Network Security Engineers plan, implement, and maintain network security measures to protect an organization's computer networks and systems. This course may be useful to a Network Security Engineer by providing a comprehensive understanding of the security threats facing election systems and the measures that can be taken to mitigate these threats.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. This course may be useful to an Information Security Analyst by providing a thorough understanding of election security, both in terms of physical voting infrastructure and digital systems.
Computer Scientist
Computer Scientists design, develop, and implement computer systems. This course may be useful to a Computer Scientist by providing a foundation in the security risks associated with voting technology.
IT Manager
IT Managers plan, implement, and oversee the technology needs of an organization. This course may be useful to an IT Manager by providing a foundation in the security risks associated with voting technology.
Systems Analyst
Systems Analysts analyze and design computer systems to meet the needs of an organization. This course may be useful to a Systems Analyst by providing a foundation in the security risks associated with voting technology.
Computer Programmer
Computer Programmers design, develop, and maintain computer programs. This course may be useful to a Computer Programmer by providing a foundation in the security risks associated with voting technology.
Software Engineer
Software Engineers apply the principles of computer science and software engineering to the design, development, deployment, and maintenance of software systems. This course may be useful to a Software Engineer by providing a foundation in the security risks associated with voting technology.
Data Analyst
Data Analysts collect, analyze, and interpret data to help organizations make informed decisions. This course may be useful to a Data Analyst by providing a foundation in the security risks associated with voting technology.
Database Administrator
Database Administrators plan, implement, and maintain databases to store and manage an organization's data. This course may be useful to a Database Administrator by providing a foundation in the security risks associated with voting technology.
Network Administrator
Network Administrators plan, implement, and maintain computer networks to meet the needs of an organization. This course may be useful to a Network Administrator by providing a foundation in the security risks associated with voting technology.
Information Technology Specialist
Information Technology Specialists plan, implement, and maintain computer networks and systems to meet the needs of an organization. This course may be useful to an Information Technology Specialist by providing a foundation in the security risks associated with voting technology.
Computer Systems Engineer
Computer Systems Engineers integrate software, hardware, networks, and other technologies. They refine, improve, and extend these systems to fulfill ever-evolving needs. This course may be useful to a Computer Systems Engineer by helping to develop an understanding of the role of technology in elections and the risks associated with this technology.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in 디지털 민주주의의 명암.
Provides a comprehensive overview of the major methods used in experimental political science research.
Provides a comprehensive overview of the major methods used in political science research.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to 디지털 민주주의의 명암.
IT 보안: 디지털 다크 아트로부터 보호
Most relevant
산업용 IoT 시장 및 보안
Most relevant
Architecting with Google Kubernetes Engine: Production 한국어
Most relevant
세계화 시대의 보안 및 안전 문제
Gemini for Security Engineers - 한국어
사이버 보안 인식 높이기
공급망금융 시장 및 핀테크 생태계
Essential Google Cloud Infrastructure: Core Services 한국어
AI 프라이버시 및 편의성
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser