• Title/Summary/Keyword: Information security education

Search Result 906, Processing Time 0.022 seconds

Research on the Analysis and Response of Unauthorized Personal Information Collection in Foreign Applications (해외 애플리케이션의 개인정보 무단 수집 실태 분석과 대응 방안에 대한 연구)

  • Kim, Se-Hwan;Yun, Hyung-Jun;Jung, Da-Hyun;Jang, Seung-Hoon;Han, Cheol-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.453-462
    • /
    • 2021
  • The number of foreign applications available in Korea is increasing. Among them, there are many cases where applications having a large number of domestic users collect users' personal information in an unauthorized manner, causing serious problems. Unauthorized collection of personal information conducted through such applications is highly dangerous, because sensitive personal information of users can be used in a malicious way. Further, this is violation of business ethics and may interrupt the creation of the sound information technology ecosystem. This research is purposed to analyze the current status of unauthorized collection of users' personal information by foreign applications available in Korea and to derive countermeasures thereof.

Role of e-Learning Environments in Training Applicants for Higher Education in the Realities of Large-Scale Military Aggression

  • Nataliia Bakhmat;Maryna Burenko;Volodymyr Krasnov;Larysa Olianych;Dmytro Balashov;Svitlana Liulchak
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.167-174
    • /
    • 2023
  • Electronic educational environments in the conditions of quarantine restrictions of COVID-19 have become a common phenomenon for the organization of distance educational activities. Under the conditions of Russian aggression, Ukrainian proof of their use is unique. The purpose of the article is to analyze the role of electronic educational environments in the process of training applicants for higher education in Ukraine in the realities of a large-scale war. General scientific methods (analysis, synthesis, deduction, and induction) and special pedagogical prognostic methods, modeling, and SWOT analysis methods were used. In the results, the general properties of the Internet educational platforms common in Ukraine, the peculiarities of using the Moodle and Prometheus platforms, and an approximate model of the electronic learning environment were discussed. The reasons for the popularity of Moodle among Ukrainian universities are analyzed, but vulnerable elements related to security are emphasized. It was also determined that the high cost of Prometheus software and less functionality made this learning environment less relevant. The conclusions state that the military actions drew the attention of universities in Ukraine to the formation of their own educational platforms. This is especially relevant for technical and military institutions of higher education.

Special Education Teachers' Competence, Self-Efficacy, and Autonomy in Using ICT amid the Covid19 Pandemic

  • Yasir A. Alsamiri;Ibraheem M. Alsawalem;Malik A. Hussain;Nur Hidayanto Pancoro Setyo Putro;Mashal S. Aljehany
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.131-140
    • /
    • 2024
  • The outbreak of Covid-19 has forced teachers of special education in Saudi Arabia to keep to themselves to live in a technology-infused society throughout the virtual teaching and learning process. This study set out to explore the competence, self-efficacy, and autonomy in using information communication technology (ICT) of special education teachers in Saudi Arabia. A total of 244 special education teachers in Saudi Arabia participated in this study. This study adopted the New General Self-Efficacy Scale developed and validated by Chen, Gully, and Eden (2001), as well as the Basic Psychological Needs in Exercise Scale (BPNES) developed and validated by Vlachopoulos and Michailidou (2006). Confirmatory factor analysis (CFA) and multivariate analysis of variance (MANOVA) were used as the main data analysis in this study. The findings showed that special education teachers in Saudi Arabia possessed competence, self-efficacy, and autonomy in using ICT in their teaching and learning process. All the factor loadings in each factor were.75 or higher, indicating good factor loadings. The results of the MANOVA indicated that special education teachers in Saudi Arabia do not report different perceptions of their competence, self-efficacy, and autonomy despite their different gender, age group, academic background, and teaching experiences.

A Study on the Problems and Improvement Plans of the Private Security Recruitment Process

  • Kim, Myung-Soo;Min, Byung-Nam;Lee, Seung-Hwan;Kim, Sung-Hee;Kim, Jae-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.179-185
    • /
    • 2021
  • Private security has the common job characteristics of the police and crime prevention, and is responsible for the safety of our society. However, the hiring process for private security is very different from that of the police. Therefore, in this study, the problems of the private security recruitment process were identified through the police recruitment process and improvement points were suggested. As a result of comparing and examining the recruitment process of the police, the recruitment of private security guards is carried out through education and training, and problems such as the training process and physical strength verification required for security work were investigated. In order to improve the problems in the private security recruitment process, the curriculum of criminal law and criminology, physical examination such as 100m running and left and right grip strength, and practical cases of security work should be added. It is hoped that this study will serve as a basic data for the development of the private security industry along with the recruitment of excellent security guards.

A Study on the Improvement of Personal Information Protection in Small and Medium-sized Medical Institutions (중소형 의료기관의 개인정보 보안실태 및 개선방안)

  • Shin, Min ji;Lee, Chang Moo;Cho, Sung Phil
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2019
  • Rapid developments of IT technology has been creating new security threats. There have been more attacks to get patients' sensitive personal information, targeting medical institutions that are relatively insufficient to prevent and defend against such attacks. Although the government has required senior general hospitals to get the ISMS certification since 2016, such a requirement has been burdensome for small and medium-sized medical institutions. Therefore, this study was designed to draw measures to identify and improve the privacy status of the medical institution by dividing it into management, physical and cyber areas for small and medium-sized medical institutions. The results of this study showed that the government should provide financial support and managerial supervision for the improvement of personal information protection of small and medium-sized medical institutions. They also suggested that the government should also provide medical security specialists, continuous medical security education, disaster planning, reduction of medical information management regulations not suitable for small and medium sized institutions.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Analysis on the Operation Status of National Education Information System (교육행정정보시스템의 운영실태분석)

  • Lee Dae-Sik;Jeong Ju-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.115-122
    • /
    • 2006
  • The purpose of this paper is to suggest the improving plans about the system as searching an effective managing devices for NEIS with analysis of managing condition. For the plans, questionnaire was performed in the five sections to primary and secondary school teachers. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. The results are following: First. in spite of satisfaction with function of C/S, it have been some problems such as frequent patch and down of server. Secondly, although the introduction of NEIS was done in hurry without gathering teachers' opinions and sufficient research of system, it has been expected to settle down normally with correction and security. Thirdly, positive reaction was generally showed in research on satisfaction of specific task for school affairs and educational matters. Fourthly, most of teachers have known the functions of NEIS and recognized its convenience. Although they has not thought it reduced their work, they have realized it's convenient for dealing with statistics. Lastly, they think of NEIS as the essential system for the age of information, in spite of problems such as reveal of personal data and security. Therefore, we should keep eyes to problem of an invasion of human right. In addition, study deep into NEIS should be conducted with consistent security for the system. In order to it. technical and legal system should be carried out side by side.

  • PDF

Formation of Resilience in the Context of Volunteer Activities Using Information and Communications Technology

  • Lazarenko, NataLiia;Sabat, Nataliia;Sabat, Nadiia;Sylenko, Nadiia;Rundong, Wang;Duchenko, Anna;Shuppe, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.374-381
    • /
    • 2022
  • The article identifies and theoretically substantiates the trends of national resilience in the context of establishing the security of the country and its civilizational subjectivity. The strategy of development of the pedagogical university in the conditions of European integration into the European educational and scientific space based on certain characterological features of the personality of the volunteer in the context of allocation of personal resilience is developed. The analysis of both external and internal challenges and threats to the civilization of the country needs to be understood in the context of economic, socio-political, legal, military-political, spiritual-cultural, educational-scientific and network-information resilience. The concepts of "national resilience" and "national security" are quite close - at first glance, even identical. However, a deeper understanding clarifies the differences: national security is a state of protection of the country identity and its very existence, the realization of its national interests. In turn, resilience is a fairly effective strategy and a fundamental guarantee of national security. At the same time, it is extremely important to understand that both national security as a state and national resilience as a strategy are only means of achieving and developing a strong and humanistic civilizational subjectivity of the country. After all, such subjectivity opens for citizens the opportunity for development, dignified self-realization and a proper life. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The use of information and communication technologies in volunteering will contribute to the formation of resilience traits in the structure of personality formation. Directly to the personal traits of resilience should be included methodological competencies, which include methodological knowledge, skills and abilities (ability to define ultimate and intermediate goals, plan, conduct and analyze knowledge, establish and implement interdisciplinary links with disciplines of medical-psychological-pedagogical cycles, etc.). All these competencies form the professional resilience of the volunteer.

Identifying Barriers to Big Data Analytics: Design-Reality Gap Analysis in Saudi Higher Education

  • AlMobark, Bandar Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.261-266
    • /
    • 2021
  • The spread of cloud computing, digital computing, and the popular social media platforms have led to increased growth of data. That growth of data results in what is known as big data (BD), which seen as one of the most strategic resources. The analysis of these BD has allowed generating value from massive raw data that helps in making effective decisions and providing quality of service. With Vision 2030, Saudi Arabia seeks to invest in BD technologies, but many challenges and barriers have led to delays in adopting BD. This research paper aims to search in the state of Big Data Analytics (BDA) in Saudi higher education sector, identify the barriers by reviewing the literature, and then to apply the design-reality gap model to assess these barriers that prevent effective use of big data and highlights priority areas for action to accelerate the application of BD to comply with Vision 2030.

A Better Prediction for Higher Education Performance using the Decision Tree

  • Hilal, Anwar;Zamani, Abu Sarwar;Ahmad, Sultan;Rizwanullah, Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.209-213
    • /
    • 2021
  • Data mining is the application of specific algorithms for extracting patterns from data and KDD is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the Web, other massive information repositories or data streams. Data mining can be used for decision making in educational system. But educational institution does not use any knowledge discovery process approach on these data; this knowledge can be used to increase the quality of education. The problem was happening in the educational management system, but to make education system more flexible and discover knowledge from it huge data, we will use data mining techniques to solve problem.