• Title/Summary/Keyword: Information security education

Search Result 909, Processing Time 0.03 seconds

Features of the Use of Computer Telecommunications In Education: Development Prospects

  • Honcharuk, Vitalii;Sherman, Mykhailo;Tumasov, Serhii;Shevchuk, Oleksii;Yeremenko, Liliia;Zaporozhchenko, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.213-217
    • /
    • 2022
  • In the article, in connection with the goal and the hypothesis put forward, the following tasks were formulated: Based on the analysis of literature and existing pedagogical experience, the possibilities, features and pedagogical conditions for the use of educational telecommunication projects were specified. The selection of topics and content of educational telecommunication projects for use has been carried out. Research methods: theoretical analysis of psychological, pedagogical and methodological literature, projects of educational standards in computer science and information technology, study of the state of the problem in teaching practice, questioning.

Theoretical Foundations of Management of the Education System: Optimization of the Complex of Organizational and Pedagogical Conditions for Effective Management

  • Yuryk, Olha;Sitsinskiy, Nazariy;Zaika, Liudmyla;Рshenychna, Lіubov;Boiko, Svitlana;Filipovych, Myroslava
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.168-174
    • /
    • 2022
  • The article defines the organizational conditions for effective management, the actions of the team to implement the concept of marketing management using the tools of pedagogical and strategic management. Due to this, results are achieved - indicators, since in our study they will be indicators of managerial efficiency: improving the "organization" function through the construction of new organizational structures; improving the functions of "analytical activity and planning" through enriching managerial work with economic and gnostic methods, analytical activities with the mandatory inclusion of financial activities, introspection of all participants, widespread use of licensed automated systems; synthesis of educational, economic, social results.

Design and Development of a Medical Education System Using Information Technology: A Case Report from the Pusan National University School of Medicine (정보기술을 활용한 의학교육시스템의 설계와 개발: 부산대학교 의학전문대학원 사례)

  • Im, Sun Ju;Lee, Sang Yeoup;Baek, Sun Yong;Woo, Jae Seok;Kam, Beesung
    • Korean Medical Education Review
    • /
    • v.16 no.1
    • /
    • pp.16-24
    • /
    • 2014
  • The development of information technology (IT) has led to changes in medical education. IT has been used for e-learning and e-teaching, e-assessment, e-logistics, and e-administration. Pusan National University School of Medicine has developed its own educational information system using IT to support students' learning and assessment and to manage curricular activities. Based on our experience, we propose six suggestions for designing new software, specifically regarding simplifying the design for users, communication with the programmer, a rapid cycle from design to implementation, orientation support for users, backup and security support, and obtaining patents. Collaborating with the Department of Medical Informatics within the School of Medicine has advantages, and an alliance among medical schools can simplify the development of software. In any case, curricular innovation should precede the introduction of technology because all technologies should support curricular goals.

Understanding and Education Measures of the Prevention of Forgery and Falsification of Blockchain for Elementary School Students (초등학생 대상 블록체인 기술의 위변조 방지 핵심원리 이해와 교육방안 설계)

  • Jung, Yujin;Kim, Jinsu;Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.6
    • /
    • pp.513-520
    • /
    • 2019
  • The general learning method aims at conveying knowledge by conveying the contents of the learning set to numerous of learners. However, such a method is difficult to induce the interest of the learner, and the unilateral delivery method has a disadvantage in that the concentration of the learner can be lowered and the overall academic achievement can be lowered. In order to solve this problem, the gay learning method which induces the interest of the students themselves is studied, and the gay learning game which combines the education and the game can influence the learning by inducing the interest of the student. In this paper, we propose a method to prevent the forgery and falsification of the blockchain, which has been widely discussed by the 4th Industrial Revolution, as a card game, And suggests ways to contribute to the development of the process.

A System for Supporting The Cyber Security Control of I&C System (제어계측 시스템 환경에서의 사이버 보안 통제 지원 시스템)

  • Jung, Hyun-Mi;Kim, Seok-Hun;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.442-448
    • /
    • 2013
  • I&C (Instrumentation & Control) system is different from information system and the security design of the two systems are also different. The modeling activity is needed based on the security control guide in order to build I&C system security control. In this paper, the role and by the security control, we designed the relationship (that is, the relation schema) between the documents for 'The system for supporting the cyber security control of I&C system design' based on the security control guide. The designed schema plans 'The system for supporting the cyber security control of I&C system' for observing the security control guide, and is used as the database and content that supports its design and implementation. The process and system of the proposed schema is utilized and designed. The design of the schema and system is intensified in the design phase with the proposed mode and supporting the I&C system cyber security design.

Impact of Social Networks Safety on Marketing Information Quality in the COVID-19 Pandemic in Saudi Arabia

  • ALNSOUR, Iyad A.;SOMILI, Hassan M.;ALLAHHAM, Mahmoud I.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.12
    • /
    • pp.223-231
    • /
    • 2021
  • The study aimed to investigate the impact of social networks safety (SNS) on the marketing information quality (MIQ) during the COVID-19 pandemic in Saudi Arabia. The study examines the statistical differences in social networks safety SNS and marketing information quality MIQ according to the demographics such as age, sex, income, and education. For this study purpose, information security and privacy are two components of social networks safety. The research materials are website resources, regular books, journals, and articles. The population includes all Saudi users of social networks. The figures show that active users of the social network reached 25 Million in 2020. The snowball method was used and sample size is 500 respondents and the questionnaire is the tool for the data collection. The Structural Equation Modelling SEM technique is used. Convergent Validity, Discriminate Validity, and Multicollinearity are the main assumptions of structural equation modeling SEM. The findings show the high positive impact of SNS networks safety on MIQ and the statistical differences in such variables refer to education. Finally, the study presents a set of future suggestions to enhance the safety of social networks in Saudi Arabia.

Special Quantum Steganalysis Algorithm for Quantum Secure Communications Based on Quantum Discriminator

  • Xinzhu Liu;Zhiguo Qu;Xiubo Chen;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1674-1688
    • /
    • 2023
  • The remarkable advancement of quantum steganography offers enhanced security for quantum communications. However, there is a significant concern regarding the potential misuse of this technology. Moreover, the current research on identifying malicious quantum steganography is insufficient. To address this gap in steganalysis research, this paper proposes a specialized quantum steganalysis algorithm. This algorithm utilizes quantum machine learning techniques to detect steganography in general quantum secure communication schemes that are based on pure states. The algorithm presented in this paper consists of two main steps: data preprocessing and automatic discrimination. The data preprocessing step involves extracting and amplifying abnormal signals, followed by the automatic detection of suspicious quantum carriers through training on steganographic and non-steganographic data. The numerical results demonstrate that a larger disparity between the probability distributions of steganographic and non-steganographic data leads to a higher steganographic detection indicator, making the presence of steganography easier to detect. By selecting an appropriate threshold value, the steganography detection rate can exceed 90%.

Digital Barrier-Free and Psychosocial Support for Students with Disabilities in Distance Learning Environments

  • Kravchenko, Oksana;Koliada, Natalia;Berezivska, Larysa;Dikhtyarenko, Svitlana;Baida, Svitlana;Danylevych, Larysa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.15-24
    • /
    • 2022
  • The article clarifies the conditions for information, digital and educational accessibility for higher education seekers with disabilities in terms of distance learning caused by quarantine restrictions. It is established that such conditions are regulated by international and Ukrainian legal documents (The Standard Rules on the Equalization of Opportunities for Persons with Disabilities, Convention on the Rights of Persons with Disabilities, Sustainable Development Goals, Law of Ukraine "On Education", Law of Ukraine "On Higher Education", Strategy for the Development of Higher Education in Ukraine 2021-2031, Development Strategy areas of innovation for the period up to 2030, Development strategy of the sphere of innovation activity for the period up to 2030). As a part of information barrierlessness, Higher Education Institutions (HEI) should provide access to information in various formats and using technologies, in particular Braille script, large-type printing, audio description (audio descriptive commenting), sign language interpretation, subtitling, a format suitable for reading by screen access programs, formats of simple speech, easy-to-read formats, means of alternative communication. The experience of Pavlo Tychyna Uman State Pedagogical University is described. In particular, special attention is paid to the study of sign language: in view of this, the initiative group implemented the project "Learning to hear and overcome social isolation together" with the financial support of the British Council in Ukraine. Within the framework of digital accessibility, the official website of the Faculty of Social and Psychological Education has been adapted for the visually impaired in accordance with WCAG 2.0 World Standards. In 2021, Pavlo Tychyna Uman State Pedagogical University implemented the project "Cultural, Recreational and Tourist Cherkasy Region: Inclusive Social 3D Map" funded by the Ukrainian Cultural Foundation; a site with available content for online travel in the region to provide barrier-free access to the historical and cultural heritage of Cherkasy region was created. Educational accessibility is achieved by increasing the number of people with special educational needs, receiving education in inclusive groups; activities of the Center for Social and Educational Integration and Inclusive Rehabilitation Social Tourism "Bez barieriv" ("Without barriers"); implementation of a research topic for financing the Ministry of Education and Science of Ukraine: "Social and psychological rehabilitation of children and youth with special educational needs by means of inclusive tourism"; implementation of the project "Social inclusion of distance educational process"; development of information campaigns to popularize the ideas of accessibility, the need for its implementation, ongoing training programs and competitions, etc.

A Study on the Customer Relationship Activation based on Service Quality of Internet Shopping Mall (디지털 경영에서 고객관계 활성화를 위한 인터넷 쇼핑몰의 서비스 품질에 관한 연구)

  • Kim, Chang-Su;Kim, Hei-Jeng;Koh, Yong-Ki
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.25-50
    • /
    • 2004
  • This study attempts to find out what kind of service quality is considered important by customers in using the Internet shopping mall and suggests the way to activate the customer relationship. The findings based on empirical analysis are shown here. First, empirical analysis of the contextual factors such as gender, education, and experience levels, shows that what customers perceive as most important in the product purchase is security in terms of the payment and personal information service. The second important service quality factor perceived by customers is responsiveness, particularly the rapidity and accuracy of response to their needs and wants. The customers also considered price, quality and diversity of the product as being important. Furthermore, there is no big difference among other service quality factors. Second, in the different gender context, there is no significant difference between the genders. However, the male group shows an even distribution of factors valued in the service quality, whereas female respondents placed stronger emphases on particular aspects of service, such as security, response, reliability and product quality. Third, in the context of different education level, the payment method between graduates and non-graduates has a significant difference. That is, the non-graduates prefer the credit card and saving through ATM, while the graduates use dual payment method using credit card and another payment method together. Therefore, the various payment methods should be considered according to the customer type, namely graduates or non-graduates. Fourth, in the context of different experience level, the result of the empirical analysis of the factors of the service quality shows no great difference between experienced and inexperienced customers. Both types of customer perceive security as the most important. To sum up, the service quality perceived by the customers of Internet shopping malls is empirically analyzed in different contexts such as gender, education, and experience. Then, the device for the customer relationship activation is suggested. It can be utilized as a guideline for the continuing diffusion of the Internet shopping mall, giving it a competitive advantage against other companies.

  • PDF

Analysis of Differences in Information Security Compliance according to Individual Coping and Organizational Homogeneity Culture (개인 대처와 조직 동질성 문화에 따른 정보보안 준수 차이 분석)

  • Hwang, In-ho
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.105-115
    • /
    • 2021
  • The purpose of this study is to present the effect of differences in individual coping and organizational homogeneity culture on information security compliance from an exploratory perspective. The study divided groups into individual coping (task-oriented, emotion-oriented) and organizational homogeneity culture (homogeneity, heterogeneity), confirms the difference in information security for each group through cross-design and presents a multiple mediation model between information security factors. As a result of the study, in the coping dimension, the average of the security compliance factors was higher in the emotion-oriented than the task-oriented, and in the homogeneity culture dimension, the average of the security compliance factors was higher in the homogeneity than the heterogeneity. Additionally, social influence and involvement had a multiple mediation effect on the relationship between information security awareness and compliance intention. The implications of this study were to confirm the difference in the effect of individual decision-making styles on security compliance according to the organizational culture differences. The results suggest the necessity of applying a customized information security compliance model for each organization and individual characteristics.