• Title/Summary/Keyword: Security Concepts

Search Result 262, Processing Time 0.022 seconds

Re-Engineering of Educational Contexts in the Digital Transformation of Socio-Economic Interactions of Society

  • Tsekhmister Yaroslav;Tetiana Konovalova;Tsekhmister Bogdan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.135-141
    • /
    • 2024
  • The article examines the key constants of reengineering the modern educational cluster, associated with the processes of digital transformation of all spheres of modern socio-cultural space. The first constant is the strategic rethinking of the educational process organization and awareness of the new roles of all participants (tutors, applicants, controlling elements, etc.). The other constant involves practical re-design of the system of educational services, which consists in the reorientation from the traditional model of education functioning for society to the implementation of the educational format in the form of new projects (structural, target, business). Consequently, the purpose of the study is to highlight the attitudes relevant to the modern realities of information and technological support of education in the context of socio-economic interactions of society. The criteria for the reengineering of educational concepts and the structural organization of the educational sphere are defined. The modern world is going through a period of complete digital transformation of all spheres of public activity. The scientific intelligence notes that education is no exception in these processes, as the dependence of educational realities on information and computer technologies is now noted. The COVID-19 pandemic, for all its tragedy, was also a kind of trigger, clearly marking the new components that have become defined in the organization of the educational process. The conclusion is made that the use of digital technologies in the organization of the educational institution or in the organization of the educational process has become not an auxiliary element, but a dominant factor. Mobility, dynamism, interdisciplinarity, synergy - all these aspects are relevant for socio-economic interactions of society and should be provided by educational programs. The results of the study can be used in the reorganization processes of educational institutions and institutions. Further research requires aspects of the analysis of the foreign experience of reengineering in education, carried out taking into account digital transformations of modern sociocultural space.

A Critical Analysis of Learning Technologies and Informal Learning in Online Social Networks Using Learning Analytics

  • Audu Kafwa Dodo;Ezekiel Uzor OKike
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.71-84
    • /
    • 2024
  • This paper presents a critical analysis of the current application of big data in higher education and how Learning Analytics (LA), and Educational Data Mining (EDM) are helping to shape learning in higher education institutions that have applied the concepts successfully. An extensive literature review of Learning Analytics, Educational Data Mining, Learning Management Systems, Informal Learning and Online Social Networks are presented to understand their usage and trends in higher education pedagogy taking advantage of 21st century educational technologies and platforms. The roles of and benefits of these technologies in teaching and learning are critically examined. Imperatively, this study provides vital information for education stakeholders on the significance of establishing a teaching and learning agenda that takes advantage of today's educational relevant technologies to promote teaching and learning while also acknowledging the difficulties of 21st-century learning. Aside from the roles and benefits of these technologies, the review highlights major challenges and research needs apparent in the use and application of these technologies. It appears that there is lack of research understanding in the challenges and utilization of data effectively for learning analytics, despite the massive educational data generated by high institutions. Also due to the growing importance of LA, there appears to be a serious lack of academic research that explore the application and impact of LA in high institution, especially in the context of informal online social network learning. In addition, high institution managers seem not to understand the emerging trends of LA which could be useful in the running of higher education. Though LA is viewed as a complex and expensive technology that will culturally change the future of high institution, the question that comes to mind is whether the use of LA in relation to informal learning in online social network is really what is expected? A study to analyze and evaluate the elements that influence high usage of OSN is also needed in the African context. It is high time African Universities paid attention to the application and use of these technologies to create a simplified learning approach occasioned by the use of these technologies.

Practices for Readiness of Future Specialists for Professional Self-Determination in the Information Society

  • Olena Kochubei;Mykola Dubinka;Inna Knysh;Ihor Poliakov;Olga Tsokur;Vasyl Tiahur;Oleksandr Kuchai
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.129-136
    • /
    • 2023
  • Professional self-determination of the individual is a complex and lengthy process of finding and realizing yourself in the profession. The main goal of professional self-determination is clarified. The basic concepts of readiness for professional self-determination of future specialists in the modern information society are revealed. The following approaches to the consideration of the concept of readiness are defined: functional-psychological, personal, activity-based. Based on the components of readiness identified by the researchers, it can be assumed that the structure of professional self-determination of the future specialist contains motivational, cognitive and activity components. Self-determination is defined as a multidimensional process that can be considered from different points of view: as a series of tasks, that society sets for the emerging individual, and which the individual must solve in a certain period. As a process of step-by-step decision-making, with the help of which the individual forms a balance between his desires and inclinations, on the one hand, and the needs of society, on the other; as a process of forming an individual lifestyle, part of which is professional activity. A number of tasks of professional self-determination of a future specialist in the information society are formulated. Diagnostic practices for determining the degree of readiness of future specialists for future professional success are characterized. Practices are developed as a basis for creating an individually oriented correctional and development program to promote the formation of future specialists' focus on future professional success. Their task is to ensure control over the dynamics of this process, assess the effectiveness of this career guidance work. Practices are aimed at identifying the degree of thorough knowledge of the conditions for achieving professional success in the chosen field of activity among future specialists.

Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection

  • Biswajit Panja
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.111-118
    • /
    • 2024
  • In general network-based intrusion detection system is designed to detect malicious behavior directed at a network or its resources. The key goal of this paper is to look at network data and identify whether it is normal traffic data or anomaly traffic data specifically for accounting information systems. In today's world, there are a variety of principles for detecting various forms of network-based intrusion. In this paper, we are using supervised machine learning techniques. Classification models are used to train and validate data. Using these algorithms we are training the system using a training dataset then we use this trained system to detect intrusion from the testing dataset. In our proposed method, we will detect whether the network data is normal or an anomaly. Using this method we can avoid unauthorized activity on the network and systems under that network. The Decision Tree and K-Nearest Neighbor are applied to the proposed model to classify abnormal to normal behaviors of network traffic data. In addition to that, Logistic Regression Classifier and Support Vector Classification algorithms are used in our model to support proposed concepts. Furthermore, a feature selection method is used to collect valuable information from the dataset to enhance the efficiency of the proposed approach. Random Forest machine learning algorithm is used, which assists the system to identify crucial aspects and focus on them rather than all the features them. The experimental findings revealed that the suggested method for network intrusion detection has a neglected false alarm rate, with the accuracy of the result expected to be between 95% and 100%. As a result of the high precision rate, this concept can be used to detect network data intrusion and prevent vulnerabilities on the network.

The Problems and Guidances of Digital Certification in EC (전자서명 인증제도의 문제점과 발전방향)

  • Kang Tea-Gyung;Hwang Sang-Gyu
    • Management & Information Systems Review
    • /
    • v.12
    • /
    • pp.1-15
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

A Conceptual Study on Outsourcing Strategy in Betel Industry (관광호텔 아웃소싱 전략에 관한 개념적 고찰)

  • 정연홍;하용규
    • Culinary science and hospitality research
    • /
    • v.8 no.3
    • /
    • pp.123-146
    • /
    • 2002
  • Outsourcing is procuring of outside resources, other than core resources for core competence, by a contract, from which a corporate can focus its core resources on core business. The outsourcing strategies of Korea tourist hotel business are in a rudimentary stage, which has been limited in simple work areas such as housekeeping services, room maid services, parking control services, security services, janitor services, laundry services, facility management, shuttle bus services, and sterilization services and their purposes are mainly to retrench a burden of employment or firm-fixed expenses. Therefore, the outsourcing strategies of Korea tourist hotel business have the following problems. First, their outsourcing has introduced only for the purpose of retrenching expenses. Second, it tends to deteriorate service quality, due to lack of pre-training. Third, it tends to concentrate their attentions only on simple repetition works. Fourth, their outsourcing is slow adjusted to the needs of business cultures. Outsourcing services in Korea tourist hotel business have never contributed to their basic concepts such as 1) maintenance or enhancement of core competences, 2) promotion of business efficiency through service quality improvement and expense retrenchment, and 3) achievement or enhancement of competitive advantage through enlarging their specialties, cultivating their market, learning new knowledge, and developing their asset. Therefore, this study is to insist on fife necessity of overcoming simple repetitive service outsourcing in tourist hotel business. In order to build a core competence and/or achieve a competitive advantage, the scopes of outsourcing services should be enlarged in Korea tourist hotel business.

  • PDF

A Study on the Eco-friendly Kitchen Detergent Container Design (조선조 경상의 다리형태를 적용한 친환경 주방세제 용기디자인 연구)

  • Kim, Chung Ho
    • Journal of the Korea Furniture Society
    • /
    • v.25 no.4
    • /
    • pp.353-363
    • /
    • 2014
  • Design of the container was designed to be able to have a sense of security by emphasizing the points and easy to use sophisticated in order to match the image of the company in an environmentally friendly form of the whole. The design of the natural detergent container, because the container itself is to prevent related bar closely with water, a slip, with an emphasis on the form of fish swim, looks the handle of the oval for the harmony of the entire container I was used to the point. The image extraction in the ordinary, you can design by applying the curve of streamlined feet of thin in order to emphasize the image of honest companies, oval fuselage top, easily without slipping and harmony of the image of the entire container in view of the functional aspects can grab to, which is designed to enter the interior. The design of the natural environment detergent container industry, it was incorporated as much as possible to the vessel and corporate image and sense of stability and the proportion of the overall shape, the basic concepts, the form on the productivity and functionality in the field of design, through the change and simplicity, with an emphasis on merchantability.

  • PDF

Age Effects of Social Capital on the Economic Well-Being in Korea (중년기 및 노년기 사회자본의 경제적 복지 효과 비교)

  • Seo, Jiwon
    • Journal of the Korean Home Economics Association
    • /
    • v.51 no.2
    • /
    • pp.207-218
    • /
    • 2013
  • Social capital theory provides a framework for analyzing the economic well-being. The purpose of this study is to analyze the age effect of social capital by comparing middle aged and the elderly, as well as to investigate the independent effects of social capital on their subjective economic well-being, respectively. The two concepts of "trust" and "social network" were used to measure the level of social capital. Comparisons between the age groups were made regarding the relationships between social capital and economic well-being of four age groups, including younger middle-aged, older middle-aged, younger elderly, and older elderly. Data from the $2^{nd}$ wave of the Korean Longitudinal Study of Ageing (KLoSA) were used. The final sample for this analysis is 8,406 respondents aged 45~84. The major findings are as follows. First, the level of social capital, trust and social network, is statistically different by age groups. Second, the model fits in the case of model including social capital variables are all larger than their counterparts in the four age groups. Third, social capital is "resource" that can contribute to increasing the subjective economic well-being. Based on the empirical results, implications for welfare policies related with issues of social security for the elderly in Korea are provided.

Towards an Ideology of Agricultural Extension as a Philosophy of Lifelong Education (농촌지도 이념으로서의 평생교육론 고찰)

  • Lee, Jong-Man
    • Journal of Agricultural Extension & Community Development
    • /
    • v.11 no.1
    • /
    • pp.1-19
    • /
    • 2004
  • The objective of this study was to find a linkage of ideological background between agricultural extension education and lifelong education. This study was conducted by analyzing the studies related to agricultural extension and lifelong education. Review of literature and documents was main methods of this study. The study reviewed and analyzed the concepts, characteristics and ideology of lifelong education, and presented some general characteristics of lifelong education in the context of educational ideology. As a result of the study, the following five characteristics of lifelong education in the context of educational ideology were presented; 1) lifelong education is the supreme concept of education and includes all kinds of education, 2) lifelong education is the future direction of educational ideology and philosophy rather than a kind of educational practice, 3) lifelong education means the security for a right of learning through the entire life-span of an individual, 4) lifelong education has the innovative function of the existing situation of education; viewpoint, contents, and methodology of learning, 5) Lifelong education runs ultimately towards a 'learning society'. Agricultural extension and lifelong education shared the similar ideological background in general, and have the similar basic philosophy. The ideology and philosophy of lifelong education should be reflected into the ideology of agricultural extension to broaden the perspectives of agricultural extension in the future.

  • PDF

A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information) (유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 -)

  • Jung Chang-Duk;Kang Jang-Mook
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF