• Title/Summary/Keyword: Security Courses

Search Result 116, Processing Time 0.025 seconds

Impact of COVID-19 Pandemic on Graduates Seeking Jobs

  • El-Boghdadi, Hatem M.;Noor, Fazal;Mahmoud, Mostafa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.70-76
    • /
    • 2021
  • The appearance of COVID-19 virus has affected many aspects of our life. These include and not limited to social, financial and economic changes. One of the most important impacts is the economic effects. Many countries have taken actions to continue the teaching process through online teaching platforms. The students are expected to graduate during the next few semesters with certificates that include some online-completed courses and their graduation certificates are called mixed certificates. This paper considers graduation mixed certificates with some online courses and its impact on graduates seeking jobs. First, we study how well the mixed certificates are accepted by job market. In other words, how different companies, organizations and even governmental entities would accept such certificates when hiring. We study the perception of job market for such certificates for different learning fields. Secondly, we study how well the online courses are accepted by the students keeping in mind that these students are used to traditional face to face teaching. Finally, we paper our results and recommendations according to the collected data from the surveys. Some of the results show that about 60% of companies don't have policies to encourage hiring graduates with mixed certificates. Also, colleges are almost divided evenly between preferring face to face and preferring online teaching.

Effects of Differences in Electronic Course Design on University Students' Programming Skills

  • Al-Zahrani, Majed bin Maili bin Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.21-26
    • /
    • 2022
  • This study touched on the effect of the different electronic course designs on the programming skills of university students. The researcher used the experimental research design of a quasi-experimental of two experimental groups to achieve the objectives of the study. The first group underwent an electronic course designed in the holistic pattern, and the second group was taught a course in a sequential pattern. This experimental design was intended to measure the impact of these two learning modes on the learners' cognitive and performance achievement of programming skills. An achievement test and observational form were the data collection tools. Data were analyzed statistically using Pearson correlation, Mann Whitney Test, and Alpha Cronbach. The findings revealed statistically- significant differences between the mean scores of the students of the first and second experimental groups in favor of the former concerning the observational form and the latter in the cognitive test. Based on the findings, some recommendations are suggested. Due to their effectiveness in the educational process, expanding using the e-courses at universities is vital. The university teachers are highly recommended to design e-courses and provide technical and material support to the e-courses user to fulfill their design purpose.

Association Rule Mining and Collaborative Filtering-Based Recommendation for Improving University Graduate Attributes

  • Sheta, Osama E.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.339-345
    • /
    • 2022
  • Outcome-based education (OBE) is a tried-and-true teaching technique based on a set of predetermined goals. Program Educational Objectives (PEOs), Program Outcomes (POs), and Course Outcomes (COs) are the components of OBE. At the end of each year, the Program Outcomes are evaluated, and faculty members can submit many recommended measures which dependent on the relationship between the program outcomes and its courses outcomes to improve the quality of program and hence the overall educational program. When a vast number of courses are considered, bad actions may be proposed, resulting in unwanted and incorrect decisions. In this paper, a recommender system, using collaborative filtering and association rules algorithms, is proposed for predicting the best relationship between the program outcomes and its courses in order to improve the attributes of the graduates. First, a parallel algorithm is used for Collaborative Filtering on Data Model, which is designed to increase the efficiency of processing big data. Then, a parallel similar learning outcomes discovery method based on matrix correlation is proposed by mining association rules. As a case study, the proposed recommender system is applied to the Computer Information Systems program, College of Computer Sciences and Information Technology, Al-Baha University, Saudi Arabia for helping Program Quality Administration improving the quality of program outcomes. The obtained results revealed that the suggested recommender system provides more actions for boosting Graduate Attributes quality.

The Impact of Using Some Participatory E-learning Strategies in Developing Skills of Designing and Producing Electronic Courses for A sample of Umm Al-Qura University Students and their Innovative Thinking

  • Emad Mohammed Samra
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.17-30
    • /
    • 2023
  • The current research aims to reveal the impact of using some participatory e-learning strategies (participatory product - classroom web simulation) in developing cognitive achievement, electronic course design skills, and - skills list - Torrance test of innovative thinking). The tools of innovative thinking among a sample of Information Science students. To achieve the objectives of current research, the researcher designed an educational website to train students to produce electronic courses via the web, according to the two participatory e-learning strategies. The researcher used a set of tools represented in (achievement test research and experimental treatment were applied to a sample of the Faculty of Computer students at Umm Al-Qura University. The results found that both participatory product strategy and web simulation have an imact on developing learning aspects discussed in the research. As for which of the two strategies had a greater impact than the other, it turned out that the web simulation strategy had a greater impact than the participatory product strategy in developing these aspects.

A Measures to Converge Manage an Efficient Information Security Management System for Information Security Experts Manpower (정보보호 인력양성을 위한 효율적인 정보보호관리체계의 융합 관리 방안)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.81-86
    • /
    • 2014
  • The development in IT technology has brought about various services that are on offer based on a new service model. But such new services have increased security risks. The government is operating a program to foster experts in information security to protect assets from the threat of such risks, too. Society's awareness on the importance of information security has also grown, leading to various courses to train such personnel, including membership clubs for the fostering of such specialists. This study seeks to suggest a method that efficiently manages the convergence of running a curriculum on ISMS(information security management systems) and a club that focuses on information protection. Such converged information security courses are expected to contribute to a safer IT-based society.

Effects of Flipped Classroom Strategy on Students' Achievements in the Computer and Information Technology Course and Their Attitudes Towards It

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.157-164
    • /
    • 2021
  • This endeavor is an attempt to explore the effect of flipped classroom strategy (FCS) on (a) academic achievement in the computer and information technology course and (b) students' attitudes towards this strategy. The sample of the study consisted of 64 students, divided into two groups: experimental and control groups. Two instruments were used to collect the data: a test and a questionnaire. The test was used to measure the students' achievement and the questionnaire to measure their attitudes towards the FCS. The results show statistically significant differences at the level of 0.05 in support of the experimental group at all Bloom's levels. Similarly, students' positive attitude towards the FCS was evident. Therefore, expanding this strategy in different courses is highly recommended because it positively impacts students' achievements. Organizing workshops and designing courses that encourage teachers to implement the strategy in the classroom and develop their technical skills are also recommended.

Designing demand side education of information security professionals (수요자 중심의 정보보호 전문 인력 양성을 위한 교육과정 설계)

  • Lee, Jong Lark
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.99-106
    • /
    • 2013
  • There has been a lot of growth more than 10% in the information security industry. In accordance with the industrial growth, it increased needs for the information security manpower development as a national problem. But there is an imbalance between demand and supply of the information security manpower in terms of the quantity and quality. It is mainly caused by the curriculum of the information security is made considering for suppliers not for demanders. As a resolution to solve this problem, we suggest the curriculum of information security for vocational education and training. As the information security area is wide in view of required knowledge and technology, we design the curriculum by selecting major occupation type from the information security manpower distribution and products and then by investigating the job description using NCS(National Competency Standard). And we compared the curriculum to that of two or three year diploma courses in Korea.

Analysis of Education Training Program of Information Security Man Power in Domestic (국내 정보보호 교육 훈련 프로그램 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3725-3730
    • /
    • 2009
  • A serious disturbance of the 7.7 DDoS hacking gets a chance of raised awareness for importance of response countermeasure with current status of information security. The critical factor out of countermeasure of information security is the supply of information human power. In this paper, we review program of information security of domestic and foreign, from major courses of domestic university, and category of government about information security, and analyze security education training awareness program of human power in the information security area.

A Study on the Curriculum of Department Security Secretarial Programs in Korea University (국내 대학 경호비서학과의 교육과정 특성에 관한 연구 - 4년제 대학을 중심으로 -)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.1-21
    • /
    • 2007
  • This study aims to analysis and measure on the curriculum of security programs in Korean university as the private security system. Civil security demand social safety life by the police protection and private security system. The private security or the civil guards shows rapid growth by the social development and improve the quality of life. But the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. Then the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyze current situation of civil body and security guard training industry and to seek an educational model. For that, we examine in 'Do the professional training organizations meet social demand for the body and security guards'? And, 'What kind of training has to be provide for the body and security guards'? and 'What the qualifications of the trainers'? Then, 'What are the differences in training courses between private organizations and universities'? 'Is there differences in the job placement among the trainers of private organizations and universities'? etc.. Conclusion, the social demand common curriculum for the body and security guard will be drawn from the analysis of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. Then we have to a standard curriculum for the successful training education system to provide social security.

  • PDF

Grope for a Scholarly identity by Comparative Analysis in curriculum of Department of the Security and Secretary Studies ("경호학과"와 "경호비서학과"의 교육과정 비교.분석을 통한 경호비서의 정체성 모색)

  • Gong, Bae-Wan
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.1-18
    • /
    • 2009
  • Recently the demand for civil protection and security guards shows rapid growth by the social development and improve the quality of life. However the supply and education system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. However, the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. Therefore, the purpose of this article is to analyse current situation of curriculum on security guard training at the universities related to this department, and to seek an educational model for this area. For that, the following questions will be examined. First, Do the professional training organizations meet social demand for the body and security guards? Second, What kind of training has to be provide for the body and security guards? and what the qualifications of the trainers? Then, what are the differences in training courses between private organizations and universities? Is there differences in the job placement among the trainers of private organizations and universities? etc.. In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim. For the scholarly identity to the security and secretary studies is th following on the core curriculum, then the university curriculum is very important for that. It is need to arrange the curriculum that is actually current at College or University for the suggestions on scholarly identity and development of the security and secretary studies.

  • PDF