• Title/Summary/Keyword: Research Security Institution

Search Result 123, Processing Time 0.025 seconds

The Practice of Overcoming Stress During Distance Learning of Students - Future Teachers of Preschool Education Institutions

  • Oksana Dzhus;Oleksii Lystopad;Iryna Mardarova;Tetyana Kozak;Tetiana Zavgorodnia
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.151-155
    • /
    • 2023
  • The main purpose of the article is to analyze the practice of overcoming during distance learning of students-future teachers of a preschool education institution. The key aspects of practical activities to counter a stressful situation during distance learning of students-future teachers of a preschool education institution are identified. The research methodology includes a number of methods designed to analyze the practice of coping with stress during distance learning of students. The results of the study include the definition of the main elements of practical activities to counteract stress and stressful situations of different scales in the distance learning of students-future teachers of a preschool education institution. Further research requires the analysis of international experience in dealing with a stressful situation during distance learning of students.

Future of Maritime Safety and Security Administration in Korea

  • Lee, Sang-Jib
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1997.10a
    • /
    • pp.13-33
    • /
    • 1997
  • The Ministry of Maritime affairs and Fisheries embarked on Oct. 8, 1996, incorporating most of the previously fragmented maritime administrations into one single institution. But the maritime administrative functions related to safety and security missions have not yet been merged into a synergetic whole, with versatile multi-functional systems working so effectively that better services to the public might be excepted. Enhancing administrative capabilities to meet future demands with limited resources requires that these missions be integrated into one institution and an enterprising management system be adopted to overcome bureaupathologies, such as complacency and inertness of administration.

  • PDF

Blockchain-based Data Storage Security Architecture for e-Health Care Systems: A Case of Government of Tanzania Hospital Management Information System

  • Mnyawi, Richard;Kombe, Cleverence;Sam, Anael;Nyambo, Devotha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.364-374
    • /
    • 2022
  • Health information systems (HIS) are facing security challenges on data privacy and confidentiality. These challenges are based on centralized system architecture creating a target for malicious attacks. Blockchain technology has emerged as a trending technology with the potential to improve data security. Despite the effectiveness of this technology, still HIS are suffering from a lack of data privacy and confidentiality. This paper presents a blockchain-based data storage security architecture integrated with an e-Health care system to improve its security. The study employed a qualitative research method where data were collected using interviews and document analysis. Execute-order-validate Fabric's storage security architecture was implemented through private data collection, which is the combination of the actual private data stored in a private state, and a hash of that private data to guarantee data privacy. The key findings of this research show that data privacy and confidentiality are attained through a private data policy. Network peers are decentralized with blockchain only for hash storage to avoid storage challenges. Cost-effectiveness is achieved through data storage within a database of a Hyperledger Fabric. The overall performance of Fabric is higher than Ethereum. Ethereum's low performance is due to its execute-validate architecture which has high computation power with transaction inconsistencies. E-Health care system administrators should be trained and engaged with blockchain architectural designs for health data storage security. Health policymakers should be aware of blockchain technology and make use of the findings. The scientific contribution of this study is based on; cost-effectiveness of secured data storage, the use of hashes of network data stored in each node, and low energy consumption of Fabric leading to high performance.

Methods of Organization of Information And Communication Technologies In Institutions of Higher Education

  • Popova, Alla;Sinenko, Oksana;Prokopenko, liudmyla;Dorofieieva Veronika;Broiako, Nadiia;Danylenko, Olha;Vitkalov, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.140-144
    • /
    • 2021
  • The article considers aspects of improving the quality of training of specialists based on the use of modern information and communication technologies in the educational process; the use of teaching methods and, as a result, an increase in the creative and intellectual components of educational activities; integration of various types of educational activities (educational, research, etc.); adaptation of information technology training to individual the characteristics of the student; ensuring continuity and consistency in learning; development of information technologies for distance learning; improving the software and methodological support of educational process.

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification (실증검증을 통한 N/A 점검항목이 보안 수준 결과에 미치는 영향에 관한 연구)

  • Lee, Jun Ho;Sung, Kyung Sang;Oh, Hea Seok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.271-276
    • /
    • 2014
  • This study analyzed that N/A check items affect the results of the security level degree, when performing vulnerability analysis evaluation. For this, we were used vulnerability analysis evaluation range, check items and quantitative calculation method. Furthermore, were applied grade and weight for the importance of the items. In addition, because technology develop rapidly, the institution is always exposed risk. therefore, this study was carried out empirical analysis by applying RAL(Risk Acceptabel Level). According to the analyzed result N/A check items factors affecting the level of security has been proven. In other words, this study found that we shall exclude inspection items irrelevant to the institution characteristics, when perform vulnerability analysis evaluation. In this study suggested that security level evaluation shall performed, after that exclude items irrelevant to the institution characteristics based on empirical verification. And also, it proposed that model research is required for establish check items for which analysis-evaluate vulnerability based on empirical verification.

An Empirical Analysis of the Impact of the Institution-based Trust Factors on the Survival of E-commerce Companies in Korea (제도기반 신뢰요소가 한국 전자상거래 기업의 생존에 미치는 영향에 관한 실증 분석 연구)

  • Park, Sho Yun;Kim, Seung Hyun
    • Knowledge Management Research
    • /
    • v.20 no.4
    • /
    • pp.131-148
    • /
    • 2019
  • E-commerce in Korea has grown steadily in recent years. E-commerce has provided firms with an effective method to approach potential customers by overcoming geographical and physical barriers. However, despite the rapid growth, many e-commerce businesses closed their businesses and were not able to survive. This study aims to empirically examine the factors that determine the survival of e-commerce businesses in Korea. In particular, this study focuses on the factors related to the notion of institution-based trust that includes delivery, privacy, and security management. This research used the data set about 31,295 e-commerce businesses that have been registered in Seoul. We found that the e-commerce business that does not require extra personal information beyond the standard terms and conditions or provides a feedback mechanism by having an online board to submit a complaint has a higher chance of survival. In addition, the e-commerce business that has a secured web server, shows the specific information about the date of delivery, or provides escrow services is likely to survive longer than others. The research has extended the extant literature on the importance of trust in e-commerce by empirically examining the effects of the institution-based trust factors on the actual survival of e-commerce businesses.

The Role of Informal Institutions in the Development of the Financial Services Market

  • Dubyna, Maksym;Panchenko, Olena;Bazilinska, Olena;Donkohlova, Tetyana;Shpomer, Alla;Rudenko, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.207-215
    • /
    • 2021
  • The aim of the article is to study the role of informal institutions in the development of the financial services market. The study outlines the concepts of scholars to identify the main types of informal institutions. The mechanism of research of influence of the informal factor on functioning of economic object is developed. The main types of informal institutions are systematized. The main informal institutions influencing the development of the financial services market are considered. The application of a synergetic approach to the consideration of the impact of the institution of trust on the financial services market is proposed.

Pedagogical Conditions And Technology Of Formation Of Management Competencies Of Future Specialists Of The System Of Higher Education Institutions

  • Rebryna, Anatolii;Kukin, Igor;Soltyk, Oleksandr;Tashmatov, Viacheslav;Bilanych, Halyna;Kramarenko, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.217-221
    • /
    • 2022
  • The article analyzes the main theoretical approaches to the formation of managerial competencies and establishes the degree of development of the problem. The content of the concept of "managerial competence" has been clarified, to determine the structure of managerial competencies of a future specialist in the education system and indicators of the formation of managerial competencies. The organizational and pedagogical conditions necessary for the effective process of forming the managerial competencies of future specialists are revealed. The following research methods were used in the work: theoretical (analysis of regulatory documents and scientific literature on the problem under study, comparison, generalization, modeling), empirical (diagnostics of the level of formation of managerial competencies of students of the system, questioning, observation, peer review, comparative qualitative and quantitative analysis of diagnostic results the level of formation of managerial competencies).

Preparing Future Specialists of Preschool Education for the Development of Conscious Citizenship and Environmental Values of Students

  • Ivanchuk, Sabina;Dronova, Olga;Vozniuk, Anna;Myskova, Nataliia;Nepomniashcha, Iryna;Sych, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.279-283
    • /
    • 2022
  • The main purpose of the study is to analyze the specifics of training future preschool education specialists for the development of conscious citizenship and environmental values of students. The methodology includes a number of theoretical methods of analysis. The importance of the issue of professional training of a specialist in a preschool institution is proved, along with an increase in the general and professional culture of a teacher, his readiness to work in alternative institutions for preschool children, it is necessary to develop creative pedagogical thinking, independence, motivational and value attitude to the profession, readiness for further self-education. Based on the results of the research, the key aspects of training future preschool education specialists for the development of conscious citizenship and environmental values of students were determined.