• Title/Summary/Keyword: Information Security Professional

Search Result 186, Processing Time 0.023 seconds

Information Technologies in the Formation of Environmental Consciousness in Future Professionals

  • Tomchuk, Mykhailo;Khrolenko, Maryna;Volokhata, Kateryna;Bakka, Yuliia;Ieresko, Oleg;Kambalova, Yanina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.331-339
    • /
    • 2022
  • The global process of transition from industrial to information society, as well as socio-economic changes taking place in Ukraine, require significant changes in many areas of state activity. It is especially connected with the reforms in the sphere of education. Today, national programs provide for the development of education on the basis of new progressive concepts, the introduction of the educational process of new pedagogical technologies and scientific achievements, the creation of a new system of information education, entrance of Ukaine into the transcontinental computer information system. Information technologies are qualitatively changing the key resources of development: this is no longer a space with fixed production, but primarily mobile finance and intelligence. They have a direct impact on the formation of personal growth, professional content and self-organization, emotional and psychological maturity and consciousness, and so on. One of the main factors in ensuring the stability and social education of the country's citizens is the culture of security, the formation and development of which is an urgent problem today. Comprehensive and systematic development of security culture will significantly increase the readiness of the population, the level of environmental, labor and patriotic education, reduce human losses, material damage from emergencies. Ecological education can be carried out more successfully only gradually and in accordance with the socio-psychological periods of one's development: kindergarten - school - college - university. The creation of such a system of environmental education should be enshrined as the basis of state environmental policy as a constitutional norm with the usage of information technology. Graduates of universities, who are the future of our country, after mastering the skills of basic environmental education must have a high level of environmental culture, which is, in turn, part of general human culture, and investigate environmental issues from the standpoint of their profession. It is known that with the help of environmental education the collective intelligence of society is formed, which can predict human activities and processes occurring in nature, and in some way to help with the elimination of crises. It is through environmental education that another system of human values is being formed, which places great emphasis on intangible wealth and solidarity, and great responsibility of humanity for the ecological state of the native country; provides a higher standard of living as a result of sustainable development, through the introduction of information technology in this system. To improve the quality of life, we need better knowledge, which must be implemented through information technology at the international level.

A Proposal of Enhanced Personal Information Security management Framework of Consigning of Personal Information (개인정보보호 강화를 위한 위탁 업무 보안관리 프레임웍 제안)

  • Ko, Youngdai-Dai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.383-393
    • /
    • 2015
  • Recently, the number of companies consigning their personal information management work has been increasing; they consign the work for various reasons and purposes, for example, in order to reduce costs related to personal information managers, improve efficiency through professional performance and to improve service quality. As such, since the cases where an consigning agency - not the personal information manager - handles personal information are increasing due to the increase of consigning of the personal information management work, we need to concerned with and pay attention to how much such agency makes efforts for personal information protection. In this regard, this study suggests a plan for efficient management of the agency during the course of consigning work as well as a list of requirements for personal information protection to be considered in each phase of the following; establishment of personal information protection framework for all consigning work processes, selection of consigning agency, execution of consigning contract, operation and management of consigning work, and termination of contract.

Information and Communications Technology in the Field of Public Security: Crime Prevention and Response System (치안분야의 정보통신기술 활용방안 연구 - 빅데이터기반 치안수요분석과 대응체계를 중심으로 -)

  • Kim, Yeon Soo
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.23-32
    • /
    • 2016
  • Rapid advances in information and communications technology are new challenges and also opportunities for the police. For the purpose of identifying its implications, this study reviews utilization cases of information and communications technology in the field of public security in South Korea and other countries. As theoretical basis for utilization of information and communications technology, this study introduces intelligence-led policing, predictive policing and evidence-based policing. Also, utilization of big-data based crime analysis and crime prediction technology, as well as advancement of information and communications system and command and control technology of the police, are discussed. Based on the identified implications in this study, the following proposals are made. They are (1) procuring basic data, (2) creating an integrated database, (3) increasing utilization of policy decision-makers, (4) exchange and cooperation between related institutions, (5) training professional analyzers, (6) establishing legal basis and practical guidelines for an integrated database.

Private Security of New York State and the Current Insight (뉴욕주의 민간경비제도와 시사점)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.79-87
    • /
    • 2017
  • The U.S. security regulation is under the influence of each state's law; however, they are mostly similar. Among many states which has the longest history of security regulation in the U.S., state of New York has been shown security regulation for a long time. The state of New York has been emphasized the importance of security significantly because it is economically, culturally, and internationally important place at the same time. New York's state law of security business includes: 1. private investigators and bail enforcement agents and watch, guard or patrol agencies license law. 2. Security guard act of 1992~,3. Title 19 New York State's code of rules and regulation (NYCRR). The law of New York City's private security could inspire Korean private security law in many ways. First, administration of professional law and variety of licensure could be an inspiration to the Korean security services. Second, there are intimate partnership between police and private security in the U.S. New York police's private security partnership has been started since 1986 by Area Police/Private Security Liaison (APPL program) and there are about 1,300 of security companies participating. This program provides not only the simple partnership but also giving essential information for promoting public safety.

The Role of Education Information in Training Specialists at Universities in the USA, Great Britain and Ukraine

  • Mamchych, Olena;Chornobryva, Natalia;Karskanova, Svitlana;Vlasenko, Karina;Syroiezhko, Olha;Zorochkina, Tetiana;Chychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.43-50
    • /
    • 2022
  • A comparative analysis of the state and results of the functioning of the education system of Ukraine with the national educational systems of the USA and Great Britain was carried out. Based on which we found out similar and different in the process of developing the system of training specialists in higher education institutions of the USA, Great Britain, and Ukraine. Describing the main quantitative indicators of education in the UK, USA and Ukraine, we found common features and distinctive features. Consideration in the comparative aspect of trends in the development of higher teacher education in the United States, Great Britain and in Ukraine gives grounds for conclusion. For these countries, such groups of norms as types of educational institutions, forms of Education; introduction of a unified system of credit units in order to create conditions for broad mobility of students; availability of different levels of training; study of the best experience of educational activities of other states and its introduction into the educational process in combination with the cultural traditions of Ukraine coincide. Describing the main quantitative indicators of education in the analyzed countries, we found distinctive features.Teacher development systems in the UK, USA and Ukraine are compared. It was found out that the use of methods of Great Britain and the United States on the organization of independent work in the process of professional development of teachers will have a positive impact on training in the system of advanced training of teachers in Ukraine. The article examines the information culture of future specialists, which is based on knowledge about the information environment, the laws of its functioning and development, and the perfect ability to navigate the limitless modern world of information.

Impact of Personal Health Information Security Awareness on Convenience (개인의료정보보안인식이 편의성에 미치는 영향)

  • Park, Jung-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.600-612
    • /
    • 2017
  • The purpose of the research is that how awareness of importance of personal medical data, laws regarding personal medical data and perception gap regarding information of medical data system may affect usage of hospital convenience between a regular patient who has experienced hospital service and medical professionals. Preceding research analysis was conducted previous on establishing research model; 150 questionnaires to a regular patient and 150 questionnaires for a medical professional, total of 300 questionnaires were gathered for conducting a question investigation. First of all, the research concluded that there are a regular perception differences between a regular patient and medical professional. Moreover, there are perception differences among the different gender, age, and area of residence. Furthermore, medical professionals tend to consider that convenience of hospital usage will be increased if user strengthens recognition of security of personal medical data. Results of hypothesis stress that higher awareness of exposure of personal medical data and medical information system affect decision making convenience for a better usage of hospital. On the other side, awareness of laws related with personal medical information security does not affect decision making convenience of hospital usage and transaction. The results of the research analyzes with proof that strengthening awareness of personal medical data security positively increase convenience of decision making and transactions in selection of provided medical service.

The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability (사이버경찰의 수사한계와 수사력 강화방안)

  • Choi, Eung-Ryul;Hwang, Young-Gu
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

Information Technologies in The Process of Teaching Foreign Languages in Higher Educational Institutions

  • Fabian, Myroslava;Shavlovska, Tetiana;Shpenyk, Silviia;Khanykina, Nataliіa;Tyshchenko, Oleh;Lebedynets, Hanna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.76-82
    • /
    • 2021
  • An anthological analysis of known literature and historical sources is carried out in the work. It was found that the development of foreign language training of future professionals was influenced by a number of factors: socio-economic (focus on the needs of the labor market, integration into the international space, scientific and technological progress); educational (updating legal documents in the field of education, standardization of educational content, development of methods of professional development of a specialist). The historical period is analyzed and the following stages are determined: ideological (realization of ideological imperative in language and professional training of future specialists; educational-methodical (preparation according to unified curricula, reading and translation as a leading type of speech activity); integration (integration of foreign language teaching and multicultural education)), methodological (use of traditional verbal methods, standardized textbooks). Thus, the research conducted in the article indicates the periods (stages) of formation, functioning and development of foreign language education.

Modernization of Education in the Context of Informatization and Automation

  • Moroz, Liudmyla;Shabelnyk, Tetiana;Zelinska-Liubchenko, Kateryna;Varakuta, Volodymyr;Push, Olena;Vysochan, Lesia;Blahun, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.41-46
    • /
    • 2021
  • The article studies the implementation of automation in the education process as a convenient interface of a document management system, on the one hand, which makes it easy to navigate the program, requiring from the user only a small amount of any special skills in working with electronic computers, on the other hand, it provides to the user operational information about all the data of interest to him, taking into account the access rights given to this or that information, stored in the enterprise database.

Information Technology In The Management Of Students' Activities While Studying

  • Zozuliak-Sluchyk, Roksoliana;Tytova, Nataliia;Kozliuk, Oleksandr;Salata, Halyna;Ridei, Nataliia;Yashnyk, Svitlana;Litvinchuk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.14-20
    • /
    • 2021
  • The method of analysis and research is applied in the work methods of managing student activities. Effective forms and methods of student quality management are determined. The model of management of educational process of students is offered. The model is to activate the student's potential, while maintaining the classical educational paradigm. The analysis of features of management of activity of students in modern model of education is carried out.