• Title/Summary/Keyword: Information Security Professional

Search Result 190, Processing Time 0.024 seconds

Technologies Of Educational Activity Development: Theoretical Fundamentals

  • Kravchuk, Nadiia;Kinakh, Nelia;Bortniuk, Tetiana;Fedosenko, Karina;Burlaka, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.177-180
    • /
    • 2021
  • The theoretical and methodological provisions that allow to systematically and comprehensively study the postgraduate pedagogical education of teachers; the essence and features of postgraduate pedagogical education of teachers of diverse training institutions, providing professional and pedagogical training of this category of pedagogical personnel, have been determined; regularities, principles and conditions for the implementation of promising directions of development of the system of postgraduate pedagogical education for teachers of diverse training have been developed; developed technological support for the development of postgraduate pedagogical education for teachers of multidisciplinary training; identified and substantiated promising directions for the development of postgraduate pedagogical education for teachers of multidisciplinary training in vocational education, due to the modernization.

The Importance of Multimedia for Professional Training of Future Specialists

  • Plakhotnik, Oleh;Strazhnikova, Inna;Yehorova, Inha;Semchuk, Svitlana;Tymchenko, Alla;Logvinova, Yaroslava;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.43-50
    • /
    • 2022
  • For high-quality education of the modern generation of students, forms of organizing the educational process and the latest methods of obtaining knowledge that differ from traditional ones are necessary. The importance of multimedia teaching tools is shown, which are promising and highly effective tools that allow the teacher not only to present an array of information in a larger volume than traditional sources of information, but also to include text, graphs, diagrams, sound, animation, video, etc. in a visually integrated form. Approaches to the classification of multimedia learning tools are revealed. Special features, advantages of multimedia, expediency of use and their disadvantages are highlighted. A comprehensive analysis of the capabilities of multimedia teaching tools gave grounds for identifying the didactic functions that they perform. Several areas of multimedia application are described. Multimedia technologies make it possible to implement several basic methods of pedagogical activity, which are traditionally divided into active and passive principles of student interaction with the computer, which are revealed in the article. Important conditions for the implementation of multimedia technologies in the educational process are indicated. The feasibility of using multimedia in education is illustrated by examples. Of particular importance in education are game forms of learning, in the implementation of which educational elements based on media material play an important role. The influence of the game on the development of attention by means of works of media culture, which are very diverse in form and character, is shown. The importance of the role of multimedia in student education is indicated. In the educational process of multimedia students, a number of educational functions are implemented, which are presented in the article. Recommendations for using multimedia are given.

The Strategies for the Development of the Security Industry Utilzing Social Network Services (경호경비산업의 발전을 위한 사회연결망서비스 활용전략)

  • Kim, Doo-Han;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.7-30
    • /
    • 2016
  • This study found the strategies for activating the security industry to utilize social network services based on the platform business model. This research was utilized for in-depth interview and IPA analysis. And use it was to check the contents and strategic improvement projects that can actually materialize and direction of the strategy. First, run a priority need area is a private center of community policing related portal development and operation, universal social networking service(SNS) utilizing expanded, professional training, IT-based security content management and operation of IT infrastructure security guards and security professionals up educational content development, online security guards and security professionals-up refresher training program development. Second, the area over the inventory capabilities increase the effectiveness of the security guards was constructed open-type comprehensive public information system. Third, the area needed to be reviewed are the individual security industry experts workers operating information channels, dedicated customer service and expanding the event of a private security guard & security service providers up. Fourth, the effectiveness of the insufficient area are discuss system improvements, the sharing of community policing closed Cameras for proposals for the expanded utilization of social networking services, private development organizations Social Network Service(SNS).

  • PDF

Emotional User Experience in Web-Based Geographic Information System: An Indonesian UX Analysis

  • Lokman, Anitawati Mohd;Isa, Indra Griha Tofik;Novianti, Leni;Ariyanti, Indri;Sadariawati, Rika;Aziz, Azhar Abd;Ismail Afiza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.271-279
    • /
    • 2022
  • In the discipline of design science, the integration of cognitive, semantic, and affective elements is crucial in the conception and development of a product. Affective components in IT artefacts have attracted researchers' attention, but little attention has been given to Geographic Information Systems (GIS). This research was conducted to identify emotions in web-based GIS, and determine design influences on the emotions using Kansei engineering (KE). In the evaluation procedure, ten web-based GIS were used as specimens, and 20 Kansei words were used as emotional descriptors in the Kansei checklist. 50 participants were asked to rate their emotional responses towards the specimens on the Kansei checklist. Principal Component Analysis was used to discover the semantic structure of Kansei, in which dynamism and spaciousness were identified. Significant Kansei concepts were identified using Factor Analysis, in which dynamic & well-organized, refreshing, spacious, professional, and nautical-look were identified. Partial Least Square analysis has assisted the research in discovering the significant design influence to the Kansei. These findings provide designers and other stakeholders with valuable knowledge for strategizing future web-based GIS designs that incorporate user emotions.

Applying Information and Communication Technologies as A Scope of Teaching Activities and Visualization Techniques for Scientific Research

  • Viktoriya L. Pogrebnaya;Natalia O. Kodatska;Viktoriia D. Khurdei;Vitalii M. Razzhyvin;Lada Yu. Lichman;Hennadiy A. Senkevich
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.193-198
    • /
    • 2023
  • The article focuses on the areas of education activities in using techniques for teaching and learning with information and communication technologies (ICTs), researching and analyzing the available ICTs, gearing the technologies to the specific psychological and pedagogical conditions, independently building and modeling ICTs, enlarging and developing their use in the learning environment. The visualization of scientific research has been determined to be part of the educational support for building students' ICT competence during teaching and learning and is essential to the methodology culture. There have been specified main tasks for pedagogy technologies (PTs) to develop the skills of adaptability to the global digital space in students, their effective database operation and using the data bases as necessary elements for learning and as part of professional training for research. We provided rationalization for implementing the latest ICTs into the Ukrainian universities' curricula, as well as creating modern methods for using the technologies in the learning / teaching process and scientific activities.

Innovative Teaching Technologies as a Way to Increase Students' Competitiveness

  • Olena M. Galynska;Nataliia V. Shkoliar;Zoriana I. Dziubata;Svitlana V. Kravets;Nataliia S. Levchyk
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.157-169
    • /
    • 2024
  • The article presents an analysis of innovative teaching technologies as a way to increase students' competitiveness. The author found that innovative technologies in education are information and communication technologies relying on computer-based learning. The structure, content of educational software, organization of Web-space are important when using innovative teaching technologies in English classes. We conducted the study in several stages: comparative analysis, synthesis, classification and systematization of the results of psychological and pedagogical, educational and methodological research; study of legislative acts, periodicals in order to identify the state of the research issue, and determining the directions of its solution, as well as subject, goal and objectives of the study. We used modelling to create situations of foreign language professional communication of future IT specialists. Empirical methods involved questionnaires used for identifying the motives of professional development and determining the features of the educational activities of future IT specialists in the process of training. The methods of mathematical statistics allowed to scientifically describe and systematize the obtained data, to identify the quantitative relationship between the studied phenomena, to analyse and summarize the results. We conducted a socio-psychological study during 2016 - 2019. It involved 255 first- and fourth-year students of National Technical University of Ukraine "Igor Sikorsky Kyiv Poly-technic Institute." Innovative information and communication technologies that improve the educational and cognitive activity of students, as well as increase the level of their knowledge have become important in teaching a foreign language in higher educational institutions. These technologies include MOODLE - Modular Object-Oriented Dynamic Learning Environment, business game, integrated pedagogical technology, case study technology. Thus, the information-rich learning process in combination with the use of innovative technologies, well-organized e-learning, interactive training courses, multimedia tools improves the program of teaching and learning foreign languages in general, and English in particular, improves the level of knowledge of future IT specialists and motivation to study and learn foreign languages, allows students to use a variety of authentic materials. We state that all these factors influence the process of individualization of learning and contribute to the successful mastery of a foreign language.

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

Formation of Resilience in the Context of Volunteer Activities Using Information and Communications Technology

  • Lazarenko, NataLiia;Sabat, Nataliia;Sabat, Nadiia;Sylenko, Nadiia;Rundong, Wang;Duchenko, Anna;Shuppe, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.374-381
    • /
    • 2022
  • The article identifies and theoretically substantiates the trends of national resilience in the context of establishing the security of the country and its civilizational subjectivity. The strategy of development of the pedagogical university in the conditions of European integration into the European educational and scientific space based on certain characterological features of the personality of the volunteer in the context of allocation of personal resilience is developed. The analysis of both external and internal challenges and threats to the civilization of the country needs to be understood in the context of economic, socio-political, legal, military-political, spiritual-cultural, educational-scientific and network-information resilience. The concepts of "national resilience" and "national security" are quite close - at first glance, even identical. However, a deeper understanding clarifies the differences: national security is a state of protection of the country identity and its very existence, the realization of its national interests. In turn, resilience is a fairly effective strategy and a fundamental guarantee of national security. At the same time, it is extremely important to understand that both national security as a state and national resilience as a strategy are only means of achieving and developing a strong and humanistic civilizational subjectivity of the country. After all, such subjectivity opens for citizens the opportunity for development, dignified self-realization and a proper life. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The use of information and communication technologies in volunteering will contribute to the formation of resilience traits in the structure of personality formation. Directly to the personal traits of resilience should be included methodological competencies, which include methodological knowledge, skills and abilities (ability to define ultimate and intermediate goals, plan, conduct and analyze knowledge, establish and implement interdisciplinary links with disciplines of medical-psychological-pedagogical cycles, etc.). All these competencies form the professional resilience of the volunteer.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

Research on big data curriculum in university suitable for the era of the 4th industrial revolution (4차 산업혁명 시대에 적합한 빅데이터 대학 교육과정 연구)

  • Choi, Hun;Kim, Gimun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1562-1565
    • /
    • 2020
  • With the development of digital technology, the industrial structure is becoming digitalize. The government selected big data as the key technology of the 4th industrial revolution. Among them, big data is widely used to create new values and services by utilizing vast amounts of information. In order to cultivate professional manpower for the use of big data, various education programs are provided at universities. We intend to develop a curriculum for systematic training of talented people who can acquire knowledge about the three stages of collection, analysis, and application of big data. To this end, subjects are classified into basic competency, technical competency, analysis competency, and business competency based on the big data competency model proposed by the Korea Internet & Security Agency.