• Title/Summary/Keyword: School security

Search Result 3,325, Processing Time 0.03 seconds

Awareness and Practice of Patients' Health Information Protection of Nursing Students (간호대학생의 의료정보보호에 대한 인식도와 실천도)

  • Kim, Eun-Young;Lim, Kyoung-Suk
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.121-132
    • /
    • 2017
  • This study is a narrative research study to understand the degree of awareness and practice of nursing college students' patients' health information protection and to grasp the relationship between them.. The subjects of this study were 122 nursing college students who experienced clinical practice in two nursing colleges in GwangJu city. Data collection was done from October 13 to 28, 2017. Using SPSS/WIN 21.0 Program, descriptive statistics, t-test, one-way ANOVA and Pearson correlation analysis were performed. As a result of the study, the degree of awareness and practicability of patient' health information protection were 4.44(SD=0.44) and 4.28(SD=0.62), respectively. There was a difference in the awareness of health information protection when they were educated about patients' health information protection at school (t=5.094, p<.001) and hospital (t=2.028, p=.045) in the case of having experience in patients' health information protection in hospitals(t=2.551, p=.012). There was a significant positive(+)correlation between patient's health information protection perception and practicing degree, and the degree of health information protection practitioner's communication domain (r=.420, p<.001). There was a significant positive correlation with the domain (r=.368, p<.001) and the referral domain (r=.304, p=.001). Based on these results, we sought to protect the personal information of patients and to provide necessary basic data to develop for standardized education program.

Hybrid Blockchain Design to Improve the Security of Education Administration Information System (교육행정정보시스템의 보안성 강화를 위한 하이브리드 블록체인 설계)

  • Son, Ki-Bong;Son, Min-Young;Kim, Young-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.1-11
    • /
    • 2021
  • The Neis System is a system integrating administrative information that was operated in elementary and secondary schools in Korea. Currently, this system is operated by a central server method and contains school administration information and important educational information of students. Among student information, the student life record contains important information for a student to advance to a higher level institution, but problems such as information leakage or manipulation may occur due to malicious attacks. In this paper, we propose a hybrid blockchain system that combines the server and blockchain technology managed by the existing Neis system. The proposed system records the query information of the database in a block when student information is accessed. When a request for correction of student information or issuance of a certificate is received, the query of the blockchain, the information in the database, and the student's key value are checked to determine whether the information has been leaked or manipulated, and only if the data is normal, the request for revision of the record is performed. This process is more secure than the existing central server because it checks the manipulation of data through the blockchain. The proposed system was implemented on the Ethereum platform, and the query information of the blockchain was experimentally verified using smart contracts. This study contributes to enhancing the reliability of the Nice system by strengthening the security against forgery and alteration of student data by combining the existing Nice system with a block chain.

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

Conceptual Approaches to Training Specialists Using Multimedia Technologies

  • Shchyrbul, Oleksandr;Babalich, Viktoriya;Mishyn, Sergii;Novikova, Viktoriia;Zinchenko, Lina;Haidamashko, Iryna;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.123-130
    • /
    • 2022
  • Modernization of the educational sector requires globalization, democratization, and the transition to an information technology society. The main goal of education at the present stage is to solve the problem of ensuring the priority of the development of education and science. In modern conditions, the quality of training of qualified specialists is becoming particularly relevant. The great role of teacher education is emphasized by its main goal, which is to train specialists who can ensure the versatile and innovative development of a person as a person and the highest value of society, its mental, physical and aesthetic abilities, high moral qualities, and, consequently, the enrichment on this basis of the intellectual, creative and cultural potential of the people. Among the strategic tasks of modernizing higher education is to ensure informatization of the educational process and access to International Information Systems. The essence of the concept of multimedia is clarified. In the context of media education, multimedia lists a number of functions: informational, interpretive, cultural, entertainment, and educational. The need to meet the needs outlined in the article in the conditions of informatization of the educational process requires the teacher to have knowledge and skills in the field of multimedia pedagogical technologies, knowledge of advanced methods and means of modern science. It is considered what relevant concepts of media education have been developed and are being developed in Ukraine and form an important basis for the modernization of education, which will contribute to the construction of an information society in the country and the formation of civil society. Distance learning is considered - the most democratic form of education that allows broad segments of society to get an education. Distance learning methods are used in higher education institutions, in school education, in the system of advanced training of teachers, in the system of training managerial personnel.

Formation of the Digital Generation in a Distance Learning Environment

  • Nataliіa, Levchenko;Nataliia, Sukhostavets;Lesia, Zelman;Alla, Kulichenko;Kseniia, Balabanova
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.335-341
    • /
    • 2022
  • This article is devoted to the study of the process of formation of the digital generation in a distance learning environment. With the introduction of quarantine due to the spread of COVID-19, opponents of digital technologies were forced to turn to relevant resources, while supporters identified new opportunities for the development of didactics and education in general. The irreversibility of the former educational reality became apparent and only the scale of the vision of potential change by interested and disinterested groups differed. Using a comprehensive approach, the authors consider the issues related to the direct and indirect impact of distance learning on children and young people born after the beginning of the XXI century. The article reveals the prerequisites and implications of distance education for the interaction of participants in the educational process. IC technologies during the educational process in the primary grades, in addition to identifying the student's learning deficit, should provide the transmission of non-verbal signals, which are important for children of this age. At the same time in the secondary school IR-technologies are designed to replace frontal learning during the assimilation of knowledge and at the same time not to worsen the quality of the educational process. Formation of students in the HEI takes place in the political science format, constant discussion of problem situations, so the task of introducing IC technology in this process is the accurate transfer of the content of the discussions. Individualization and autonomization of the educational process, its dependence on the results of the choice of educational content, and the use of pedagogical management tools change the philosophy of education for children and youth. The authors conclude that the formation of a digital generation, characterized by an increased level of digital literacy of children and youth, the possession of a certain level of digital capacity requires the use of strategies aimed at optimizing the learning process in a digital educational environment.

A Study on the Method of Creating a Safety Vulnerable Class Distribution Diagram for Non-Structural Countermeasures in the Comprehensive Natural Disaster Reduction Plan (자연재해저감종합계획 비구조적 대책의 안전취약계층도 작성방안에 관한 연구)

  • Doo Hee Kim;In Jae Song;Byung-Sik Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2023
  • The comprehensive natural disaster reduction plan, the highest plan in the disaster prevention field, was implemented by local governments. second plan is currently being formulated. In order to minimize human and property damage, structural and non-structural measures for each of the nine disaster types are established and implemented for 10 years. Structural measures are based on engineering and quantitative analysis, and the criteria for setting reduction measures are clear. Non-structural measures, however, currently lack the set criteria. the basic disaster and safety management law included the safety vulnerable class in 2018. Currently, the safety vulnerable class of the detailed establishment criteria of the comprehensive natural disaster reduction plan is being established, including children, the elderly, and the disabled. However, due to the lack of data securing and database construction by local governments, it is difficult to prepare a location map for establishing reduction measures for the safety vulnerable. Therefore, in this study, OPEN API data of the safety vulnerable class were collected and statistical information and GIS of SGIS information services were used. The distribution diagram of the safety vulnerable class in Samcheok, Gangwon-do, which is a sample area, and the distribution diagram of the safety vulnerable class in units of the output area (OA) in Geundeok-myeon were prepared.

An Improvement Study on the Hydrological Quantitative Precipitation Forecast (HQPF) for Rainfall Impact Forecasting (호우 영향예보를 위한 수문학적 정량강우예측(HQPF) 개선 연구)

  • Yoon Hu Shin;Sung Min Kim;Yong Keun Jee;Young-Mi Lee;Byung-Sik Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.87-98
    • /
    • 2022
  • In recent years, frequent localized heavy rainfalls, which have a lot of rainfall in a short period of time, have been increasingly causing flooding damages. To prevent damage caused by localized heavy rainfalls, Hydrological Quantitative Precipitation Forecast (HQPF) was developed using the Local ENsemble prediction System (LENS) provided by the Korea Meteorological Administration (KMA) and Machine Learning and Probability Matching (PM) techniques using Digital forecast data. HQPF is produced as information on the impact of heavy rainfall to prepare for flooding damage caused by localized heavy rainfalls, but there is a tendency to overestimate the low rainfall intensity. In this study, we improved HQPF by expanding the period of machine learning data, analyzing ensemble techniques, and changing the process of Probability Matching (PM) techniques to improve predictive accuracy and over-predictive propensity of HQPF. In order to evaluate the predictive performance of the improved HQPF, we performed the predictive performance verification on heavy rainfall cases caused by the Changma front from August 27, 2021 to September 3, 2021. We found that the improved HQPF showed a significantly improved prediction accuracy for rainfall below 10 mm, as well as the over-prediction tendency, such as predicting the likelihood of occurrence and rainfall area similar to observation.

Ensuring the Quality of Higher Education in Ukraine

  • Olha Oseredchuk;Mykola Mykhailichenko;Nataliia Rokosovyk;Olha Komar;Valentyna Bielikova;Oleh Plakhotnik;Oleksandr Kuchai
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.142-148
    • /
    • 2023
  • The National Agency for Quality Assurance in Higher Education plays a crucial role in education in Ukraine, as an independent entity creates and ensures quality standards of higher education, which allow to properly implement the educational policy of the state, develop the economy and society as a whole.The purpose of the article: to reveal the crucial role of the National Agency for Quality Assurance in Higher Education to create quality management of higher education institutions, to show its mechanism as an independent entity that creates and ensures quality standards of higher education. and society as a whole. The mission of the National Agency for Quality Assurance in Higher Education is to become a catalyst for positive changes in higher education and the formation of a culture of its quality. The strategic goals of the National Agency are implemented in three main areas: the quality of educational services, recognition of the quality of scientific results, ensuring the systemic impact of the National Agency. The National Agency for Quality Assurance in Higher Education exercises various powers, which can be divided into: regulatory, analytical, accreditation, control, communication.The effectiveness of the work of the National Agency for Quality Assurance in Higher Education for 2020 has been proved. The results of a survey conducted by 183 higher education institutions of Ukraine conducted by the National Agency for Quality Assurance in Higher Education are shown. Emphasis was placed on the development of "Recommendations of the National Agency for Quality Assurance in Higher Education regarding the introduction of an internal quality assurance system." The international activity and international recognition of the National Agency for Quality Assurance in Higher Education are shown.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

Hierarchy in Signed Networks

  • Jamal Maktoubian
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.111-118
    • /
    • 2024
  • The concept of social stratification and hierarchy among human dates back to the origin of human race. Presently, the growing reputation of social networks has given us with an opportunity to analyze these well-studied phenomena over different networks at different scales. Generally, a social network could be defined as a collection of actors and their interactions. In this work, we concern ourselves with a particular type of social networks, known as trust networks. In this type of networks, there is an explicit show of trust (positive interaction) or distrust (negative interaction) among the actors. In other words, an actor can designate others as friends or foes. Trust networks are typically modeled as signed networks. A signed network is a directed graph in which the edges carry an edge weight of +1 (indicating trust) or -1 (indicating distrust). Examples of signed networks include the Slashdot Zoo network, the Epinions network and the Wikipedia adminship election network. In a social network, actors tend to connect with each other on the basis of their perceived social hierarchy. The emergence of such a hierarchy within a social community shows the manner in which authority manifests in the community. In the case of signed networks, the concept of social hierarchy can be interpreted as the emergence of a tree-like structure comprising of actors in a top-down fashion in the order of their ranks, describing a specific parent-child relationship, viz. child trusts parent. However, owing to the presence of positive as well as negative interactions in signed networks, deriving such "trust hierarchies" is a non-trivial challenge. We argue that traditional notions (of unsigned networks) are insufficient to derive hierarchies that are latent within signed networks In order to build hierarchies in signed networks, we look at two interpretations of trust namely presence of trust (or "good") and lack of distrust (or "not bad"). In order to develop a hierarchy signifying both trust and distrust effectively, the above interpretations are combined together for calculating the overall trustworthiness (termed as deserve) of actors. The actors are then arranged in a hierarchical fashion based on these aggregate deserve values, according to the following hypothesis: actor v is assigned as a child of actor u if: (i) v trusts u, and (ii) u has a higher deserve value than v. We describe this hypothesis with additional qualifiers in this thesis.