• Title/Summary/Keyword: Information Security Culture

Search Result 236, Processing Time 0.025 seconds

Information Technology In The Management Of Students' Activities While Studying

  • Zozuliak-Sluchyk, Roksoliana;Tytova, Nataliia;Kozliuk, Oleksandr;Salata, Halyna;Ridei, Nataliia;Yashnyk, Svitlana;Litvinchuk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.14-20
    • /
    • 2021
  • The method of analysis and research is applied in the work methods of managing student activities. Effective forms and methods of student quality management are determined. The model of management of educational process of students is offered. The model is to activate the student's potential, while maintaining the classical educational paradigm. The analysis of features of management of activity of students in modern model of education is carried out.

Formation of Anti-Corruption Consciousness of Citizens as a Direction of Interaction of Public Authorities and Institutions of Civil Society

  • Shpak, Yurii;Bandura, Ivan;Primush, Roman;Dokalenko, Varvara;Abdullayev, Vagif
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.17-22
    • /
    • 2022
  • This article defines the process of formation of anti-corruption consciousness as one of the areas of interaction between public authorities and civil society institutions. It is concluded that the implementation of the state anti-corruption policy in Ukraine may be more promising if the institutions of civil society are actively involved. The degree of citizen engagement can be increased by increasing social trust, as well as by increasing the level of political and legal education and culture. Particular attention should be paid to the organization of public control and monitoring of the activities of public authorities, impartial coverage of information on the fight against corruption in the media, as well as the joint conduct of an information and educational campaign and the promotion of the formation of anti-corruption consciousness among a large number of citizens.

Perceived Risk and Purchase Obstruction Factors When Purchasing Clothing Online (인터넷 쇼핑몰에서 구매 경험과 소비자 특성이 의류 제품 구매 시 지각하는 위험과 구매 저해에 미치는 영향)

  • Kim, Ji-Yeon;Moon, Ji-Young;Park, Jung-Kwon;Choi, Eun-Chung;Lee, Ji-Yeon
    • The Research Journal of the Costume Culture
    • /
    • v.18 no.1
    • /
    • pp.118-132
    • /
    • 2010
  • The purpose of this study is to understand factors of risk perception and purchase obstruction by consumer characteristics and purchase experience of clothing in online. The collection of the research materials was progressed by online and offline. Out of 374 usable questionnaires used for examining this study, 278 questionnaires were collected from offline and 107 questionnaires were collected from online. Frequency analysis, factor analysis, reliability analysis, t-test, One-way ANOVA and multiple regression analysis using SPSS WIN 12.0 were conducted. Three factors of perceived risk were extracted: harmonic/image, quality/shopping process, payments. Based on these dimensions, ANOVA was conducted. The results indicated that the more purchasing experience people had, the less the extent of perceived risk they got, and quality/shopping process risk mostly among them. As the factors which obstruct purchasing decision, a security obstruction, a reliability obstruction, a convenient obstruction and an information insufficient obstruction are extracted. Also, the factors have got the result of same aspects as the perceived risk recognized by the Internet shopping experience. Meaningful differences between groups appear at security obstruction, reliability obstruction, and convenient obstruction. Perceived risk almost influenced on purchase obstruction when purchasing clothes in Internet shopping mall. When consumers perceiving harmony/image risk highly make decisions, they usually hesitate or abandon due to reliability obstruction, convenient obstruction. All the factors: including security obstruction, reliability obstruction, convenient obstruction and information insufficient obstruction made consumers perceiving quality/shopping process risk highly obstruct purchase decision.

Evolution Of Educational Activity: Digitalization Of Information Space Of Distance Education

  • Postova, Svitlana;Karpliuk, Svitlana;Vdovina, Olena;Nakonechna, Oksana;Khoroshev, Oleksandr;Chernova, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.163-168
    • /
    • 2021
  • The article discusses the use of the concept of digitalization in the science of education. The influence of information technologies on the ability to self-study is analyzed. Various technologies that are used in science and education are shown. The issues of the advantages of using IT as a tool for creating conditions for the implementation of the problem-activity approach and the organization of project activities are considered. The possibilities are shown, which gives the opportunities that the use of ICT of distance educational resources in the educational process gives. Shown is their auxiliary form of transmission, information retrieval; working out skills and consolidating what has been learned. Based on the analysis of the presented material of the article, you can see what problems can be solved using IT and remote resources.

Application of Information Technologies for Lifelong Learning

  • Poplavskyi, Mykhailo;Bondar, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.304-311
    • /
    • 2021
  • The relevance of the research involves outlining the need for modern professionals to acquire new competencies. In the conditions of rapid civilizational progress, in order to meet the requirements of the labor market in the knowledge society, there is a readiness for continuous training as an indicator of professional success. The purpose of the research is to identify the impact of various forms of application of information technologies for lifelong learning in order to provide the continuous self-development of each person without cultural or age restrictions and on the basis of rapid digital progress. A high level (96%) of need of the adult population in continuing education with the use of digital technologies has been established. The most effective ways to implement the concept of "lifelong learning" have been identified (educational camps, lifelong learning, mass open online courses, Makerspace activities, portfolio use, use of emoji, casual game, scientific research with iVR game, implementation of digital games, work in scientific cafes). 2 basic objectives of continuing professional education for adults have been outlined (continuous improvement of qualifications and obtaining new qualifications). The features of ICT application in adult education have been investigated by using the following methods, namely: flexibility in terms of easy access to ideas, solving various problems, orientation approach, functional learning, group or individual learning, integration of leisure, personal and professional activities, gamification. The advantages of application of information technologies for continuous education (economic, time, and adaptive) have been revealed. The concept of continuous adult learning in the context of digitalization has been concluded. The research provides a description of the structural principles of the concept of additional education; a system of information requests of the applicant, as well as basic technologies for lifelong learning. The research indicates the lack of comprehensive research in the relevant field. The practical significance of the research results lies in the possibility of using the obtained results for a wider acquaintance of the adult population with the importance of the application of lifelong learning for professional activities and the introduction of methods for its implementation in the educational policy of the state.

The Role of Education Information in Training Specialists at Universities in the USA, Great Britain and Ukraine

  • Mamchych, Olena;Chornobryva, Natalia;Karskanova, Svitlana;Vlasenko, Karina;Syroiezhko, Olha;Zorochkina, Tetiana;Chychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.43-50
    • /
    • 2022
  • A comparative analysis of the state and results of the functioning of the education system of Ukraine with the national educational systems of the USA and Great Britain was carried out. Based on which we found out similar and different in the process of developing the system of training specialists in higher education institutions of the USA, Great Britain, and Ukraine. Describing the main quantitative indicators of education in the UK, USA and Ukraine, we found common features and distinctive features. Consideration in the comparative aspect of trends in the development of higher teacher education in the United States, Great Britain and in Ukraine gives grounds for conclusion. For these countries, such groups of norms as types of educational institutions, forms of Education; introduction of a unified system of credit units in order to create conditions for broad mobility of students; availability of different levels of training; study of the best experience of educational activities of other states and its introduction into the educational process in combination with the cultural traditions of Ukraine coincide. Describing the main quantitative indicators of education in the analyzed countries, we found distinctive features.Teacher development systems in the UK, USA and Ukraine are compared. It was found out that the use of methods of Great Britain and the United States on the organization of independent work in the process of professional development of teachers will have a positive impact on training in the system of advanced training of teachers in Ukraine. The article examines the information culture of future specialists, which is based on knowledge about the information environment, the laws of its functioning and development, and the perfect ability to navigate the limitless modern world of information.

The study on the Effectiveness Improvement of physical security system: Focused on the Disaster Safety Awareness (시설보안시스템의 효과적 안전관리를 위한 연구: 재난안전의식을 중심으로)

  • Kim, Changho;Shin, Soyoung
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.615-621
    • /
    • 2015
  • Man-made disasters are disastrous event, which can be reduced the damage through preventive measures and thorough inspections, unlike natural disasters. Thus, safety consciousness of citizens is not only important, but also safety consciousness of security guard who are involved with facility safety management. In other words, safety consciousness and fostering professionalism of security guards could reduce the damage, including human disaster and it enables the effective safety management. Therefore, this study selected the training and the organizational safety as variables with the influencing factors for improving the disaster safety consciousness of facility guard. After the analysis, the following results were confirmed. First, the training content and its environment would have a significant impact on the disaster safety consciousness. Second, organizational safety would have a significant impact on disaster safety consciousness. In other words, the improvement of training program and the formation of safety culture in organizational level will have a positive impact on the disaster safety awareness and enable effective safety management.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

A Study on the Working space Lay-out for Working on Information in the Offices (정보성 업무특성 따른 업무공간 레이아웃(Lay-out)에 관한 연구)

  • 이상호;신동준
    • Korean Institute of Interior Design Journal
    • /
    • no.32
    • /
    • pp.64-71
    • /
    • 2002
  • Today, term of ‘industrial society’means the totally changing society by new technical innovation through the Industrial Revolution begun in England at the mid-nineteenth century and it made social structure centering agricultural culture change with industrial culture with expansion of goods by the massive production. Information working area has to bo a space not just for improving business efficiency in industrial society but for developing efficiency in working in harmony with the information and structural aspects based on computer and communication technology. There are two kinds of environmental elements of working space : the tangible ones are the area and the structure of working space, lights, network, layout and information machines in office, the intangible ones are a feeling of satisfaction of management and arrangement of office information machines capability of information delivery, common ownership of documents and their files, the security and connection between office workers, and harmony. According to the wave of information begun from the late twentieth century, structural layout of working area has become various by the working type through network of new developed information communication machines. But it is hard to apply them in actually.