• Title/Summary/Keyword: Security Courses

Search Result 116, Processing Time 0.022 seconds

Maritime Security Training: Evaluation of the Impact on Seafarers' Security Awareness and Security Performance (선박보안교육: 선원의 보안인식과 보안성과에 미치는 영향 평가)

  • D'agostini, Enrico;Jo, Sohyun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.2
    • /
    • pp.201-211
    • /
    • 2019
  • Safety and security measures in the shipping industry play a pivotal role in ensuring efficient and reliable cargo and passengers operations at each stage of the supply chain. The ISPS Code was adopted into SOLAS convention to protect seafarers and vessels from security threats. Furthermore, according to the Manila amendments to STCW Convention in 2010, personnel employed on board are required to participate in security training. Effective seafarers' education and training programs are of major importance to guarantee satisfactory performance levels onboard to minimize security-related risks. The study's contribution focuses on empirically evaluating the relationship between personal level of awareness and security performance when seafarers undertake security training courses. Findings of this study suggest that (1) seafarers who undertake maritime security training have a higher awareness of ship security, (2) security training and security awareness have a positive influence on security performance, and (3) security awareness mediates the impact of security training and security performance. In conclusion, education and training programs are key tools in enhancing seafarers' security awareness and security performance which, from an industry viewpoint, can translate into major economic, operational and reputational benefits.

A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework (보안전문인력 양성을 위한 직업분류체계별 정보보호 핵심지식 설계)

  • Lee, Hyojik;Na, Onechul;Sung, Soyoung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.113-125
    • /
    • 2015
  • Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.

Curriculum development group specializing in the Department of Hu-man Resources plan (군 전문인력 양성학과 교육과정 개발 방안)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.195-202
    • /
    • 2013
  • Defense reform our military for the globalization of information. Scientific command structure, troop structure, unit structure, step-by-step into the power structure while promoting a history of quantitative-oriented structure, and structure of the quality of state-of-the-art technology-driven transition in the middle of the bottle numberplans about the current 3.3-fold increase in reducing the cadre(officers and NCOs). NCO groups in the executive, especially expanding the current level of 100% increase in the rate of long-serving, while ensuring a stable job and to superior resources to secure a stable policy through science. Military alliance is now underway. In the midst of this group, and urged the group at the University of the leading military and specialized resources to ensure each agreement required by subjects to reflect. Thus effectively improve the quality of education and the demands of the job analysis, DACUM curriculum development methods and procedures can be applied at the time of urgent need for foster an excellent resource for the discharge of curriculum development at the University of Selected as a core job, career, and job classification configuration inside of Duty according to KST derived from the group reflect on the training courses to meet the requirements in the curriculum through the development of curriculum, job definition, job model set to propose.

Designing a Micro-Learning-Based Learning Environment and Its Impact on Website Designing Skills and Achievement Motivation Among Secondary School Students

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.335-343
    • /
    • 2021
  • The study aimed to elucidate how to design a learning environment on the premise of micro-learning (ML) and investigate its impact on website designing skills and achievement motivation among secondary school students. Adopting the experimental approach, data were collected through an achievement test, a product evaluation form, and a test to gauge motivation for achievement. The sample was divided into two experimental groups. Results revealed statistically significant differences at 0.05≥α between the mean scores of the two groups that experienced ML, irrespective of the two modes of presenting the video in the pre-test and post-test, as for the test of websites design skills, product evaluation form, and achievement motivation test. Besides, there have been statistically significant differences at 0.05≥α between the mean scores of the first experimental group that had exposure to ML using the split-video presentation style and the scores of the second experimental group that underwent ML using continuous video presentation style in the post cognitive test of website design and management skills in favor of the group that had segmented-video-presentation ML. Another salient finding is the nonexistence of significant differences at 0.05≥α between the mean scores of the first experimental group that underwent segmented-video-presentation ML and the grades of the second experimental group that received ML with continuous video presentation style in the post-application of the product scorecard of websites designing skills and the motivation test. In light of these salient findings, the study recommended using ML in teaching computer courses at different educational stages in Saudi Arabia, training computer and information technology teachers to harness ML in their teaching and using ML in designing courses at all levels of education.

Curriculum Development Direction through Content Analysis of the safety security guard (경호·경비분야 연구의 내용분석에 따른 교육과정 개선을 위한 개발방향 탐색)

  • Park, Young-Man
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.253-272
    • /
    • 2017
  • This study analyzes the contents of 1,279 articles related to administrative, management, marketing, and service for private clients among the scholarly research results in the field of security and security, and categorizes the main topic security, private security, The results of this study are as follows. First, the main academic achievements of the security and security sciences were first identified by finding 32 subordinate or related subjects in each category. The situation of the curriculum and the environment which is insufficient compared to the needs of academia and the age was confirmed. The task of improving security and security science analyzed through this study is the expansion of education and training courses related to management and service, which are suitable for the major course of the major. And the analysis of socio-scientific disciplines and job types in the field of security and security In this study, firstly, it is necessary to develop a management and marketing measurement tool suggesting the specificity of security and security business. Second, it is necessary to reconsider learning units of management skill related to management and marketing. Third, In order to improve the curriculum of security related departments, we proposed the necessary preconditions and improvement directions.

  • PDF

Markov Chain Model-Based Trainee Behavior Pattern Analysis for Assessment of Information Security Exercise Courses (정보보안 훈련 시스템의 성취도 평가를 위한 마코브 체인 모델 기반의 학습자 행위 패턴 분석)

  • Lee, Taek;Kim, Do-Hoon;Lee, Myong-Rak;In, Hoh Peter
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1264-1268
    • /
    • 2010
  • In this paper, we propose a behavior pattern analysis method for users tasking on hands-on security exercise missions. By analysing and evaluating the observed user behavior data, the proposed method discovers some significant patterns able to contribute mission successes or fails. A Markov chain modeling approach and algorithm is used to automate the whole analysis process. How to apply and understand our proposed method is briefly shown through a case study, "network service configurations for secure web service operation".

An Analysis on Training Curriculum for Educating Information Security Experts (정보보안 전문인력 양성을 위한 교육과정 분석)

  • Park, Jae-Yong
    • Management & Information Systems Review
    • /
    • v.31 no.1
    • /
    • pp.149-165
    • /
    • 2012
  • Nowadays due to the development of IT, hacking has become a major issue and importance of information system security is rapidly increasing. This research focuses on problems of training system security experts within Korea by analysing university's management information system curriculum and proposes an alternative way to solve this problem. The result of this research is the following. First, reformation of university's curriculum for successfully training system security experts is crucial. Second, theories that was learned in university courses need to be coherent to the actual work that the system security experts do in the field. Lastly, advanced IT countries like the US and Japan have already made standards on training system auditors and reinforced it with laws. Therefore Korea should establish a formal standard system like the other IT industry advanced countries.

  • PDF

Satisfaction to Major selection and employment of majoring in Security Students and future correspondence plan (경호학과 학생들의 전공 선택 및 취업에 대한 만족도와 향후 대응 방안)

  • Choi, Jeong-Il;Chang, Ye-Jin
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.57-78
    • /
    • 2016
  • This study was set up hypotheses and conduct surveys target major in security students that the higher satisfaction with the curriculum and major selection will be higher satisfaction for the job selection and employment after graduation. Test results Chronbach's Alpha coefficients 0.833 have been calculated as ensuring internal consistency and simple regression analysis revealed a correlation coefficient of each item is presented to 0.811 showed a very high correlation. Therefore, the higher the satisfaction with the major selection and curriculum were analyzed by the higher satisfaction with the job choices and employment after graduation. The university seems to need effective training courses to give students an increasing satisfaction with the majors. To increase the level of theoretical and practical training is required to the active support and attention of Industrial School Institute. In order to increase the satisfaction of employees and future development security, the need for effective education in universities is raised.

  • PDF

A Study on Improvements of the Information Security Department via the Curriculum Analysis (국내 정보보호학과의 교육과정 분석을 통한 개선방안 연구)

  • Lim, Wongyu;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.71-80
    • /
    • 2014
  • Accidents for information disclosure occurred in a steady increase, so many information security department has been established recently. But there was a lack of differentiation between department of IT department and they cannot train appropriate students for companies. This research examined the Workforce framework and competencies, the related research for improving information security curriculum. And then this research analyzed status and characteristics of the curriculum to the information security department, based on the Workforce framework and competencies presented by NICE. The result of the research confirmed that the current curriculum mainly consists of courses dealing with development of products that secure information, so the curriculum is needed to improve by focusing on workforce framework competencies. The result will be utilized as fundamental research for improving the curriculum of information security major in the future.

  • PDF

Curriculum and Characterization Subjects Development for Department of IT convergence Based Army Contract (군계약 IT융복합학과를 위한 특성화 교과목 및 교육과정 개발)

  • Choi, Chul-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.5
    • /
    • pp.129-137
    • /
    • 2014
  • This study proposed an IT convergence curriculum for educating the Non-Commissioned Officers. This program was produced by the comprehensive reference to the curriculums of military academies and systematic and rational modelling. The key features of the proposed curriculum are to consolidate the following three areas to meet the needs of the NCO, a recipient of the education. First, IT related subjects were posed as a mainstay of the curriculum that is critical for the scientific and information advancement of the forces. Second, the military leadership courses were included in the effective management of the soldiers. Third, military counseling certificate courses were included, a ground breaking trial nationally. In addition to this, we presented a characterized courses that focus on hands-on skills and knowledge for performing the duties of the NCO.