• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.021 seconds

New Trends and Strategies For the Integration of Information and Communication Technologies in Educational Activities

  • Vasіutina, Tеtіana;Cherednyk, Lidiia;Klymenko, Oksana;Sokur, Olena;Shevchuk, Anatolii;Zatserkivna, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.169-172
    • /
    • 2021
  • The article discusses the results of a quantitative analysis of open educational resources in the field of information technology. Study is based on a study of the content of ten platforms that provide access to open resources (OPs). To achieve this goal, we used the following methods: theoretical analysis and generalization of Internet sources to determine the popularity of educational platforms and resources on them; quantitative data analysis to determine the relative proportion of IT courses in various parameters: the relative weight of courses in the IT field in general and on each platform in particular, the language of instruction, the quantitative content by thematic areas. The following platforms providing access to open educational resources were subjected to quantitative analysis: Coursera, Edx, Udemy, MIT OpenCourseWare, OpenLearn, Intuit, Prometheus, UoPeople, Open Learning Initiative, Maidan Open University.

A Secure Database Model based on Schema using Partition and Integration of Objects (객체의 분할과 통합에 의한 스키마 기반 데이타베이스 보안 모델)

  • Kang, Seog-Jun;Kim, Yoeng-Won;Hwang, Chong-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.51-64
    • /
    • 1995
  • In distributed environments, the DB secure models have been being studied to include the multi-level mechanism which is effective to control access according to the level of the data value. These mechanisms have the problems. The first, it is impossible to maintain the global data which is protected in the multi-level mechanism. The second, the access and the relation of the data is not clear due to the access revocation between the local data and the global's. In this paper, we proposed the mechanism using shema. The mechanism doesn't have the access revocation, and provides the protection of the data and the control to the global data.

Analysis of The Application of Information and Innovation Experience in The Training of Public Administration Specialists

  • Smyrnova, Iryna;Akimov, Oleksandr;Krasivskyу, Orest;Shykerynets, Vasyl;Kurovska, Ilona;Hrusheva, Alla;Babych, Andrii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.120-126
    • /
    • 2021
  • The article analyzes the possibility of using information and innovation experience in training public administration specialists, and also explores the system of training public administration and management specialists abroad. It was determined that in the European Union, Japan and other developed countries, three concepts of qualified personnel training will be developed: the concept of specialized training is focused on the present or near future and is relevant for the respective workplace; the concept of multidisciplinary training is effective from an economic point of view, as it increases intra-production and non-production mobility of an employee; the concept of learner-centered learning with the aim of developing human qualities.

UML Modeling to TM Modeling and Back

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.84-96
    • /
    • 2021
  • Certainly, the success of the Unified Modeling Language (UML) as the de facto standard for modeling software systems does not imply closing the door on scientific exploration or experimentation with modeling in the field. Continuing studies in this area can produce theoretical results that strengthen UML as the leading modeling language. Recently, a new modeling technique has been proposed called thinging machine (TM) modeling. This paper utilizes TM to further understand UML, with two objectives: (a) Fine issues in UML are studied, including theoretical notions such as events, objects, actions, activities, etc. Specifically, TM can be used to solve problems related to internal cross-diagram integration. (b) TM applies a different method of conceptualization, including building a model on one-category ontology in contrast to the object-oriented paradigm. The long-term objective of this study is to explore the possibility of TM complementing certain aspects in the UML methodology to develop and design software systems. Accordingly, we alternate between UML and TM modeling. A sample UML model is redesigned in TM, and then UML diagrams are extracted from TM. The results clarify many notions in both models. Particularly, the TM behavioral specification seems to be applicable in UML.

A Computer-Aided Text Analysis to Explore Recruitment and Intellectual Polarization Strategies in ISIS Media

  • Khafaga, Ayman Farid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.87-96
    • /
    • 2022
  • This paper employs a computer-aided text analysis (CATA) and a Critical Discourse Analysis (CDA) to explore the strategies of recruitment and intellectual polarization in ISIS (Islamic State in Iraq and Syria) media. The paper's main objective is to shed light on the efficacy of employing computer software in the linguistic analysis of texts, and the extent to which CATA software contribute to deciphering hidden meanings of texts as well as to arrive at concise and authentic results from these texts. More specifically, this paper attempts to demonstrate the contribution of CATA software represented in the two variables of Frequency Distribution Analysis (FDA) and Content Analysis (CA) in decoding the strategies of recruitment and intellectual polarization in one of ISIS 's digital publication: Rumiyah (a digital magazine published by ISIS). The analytical focus is on three strategies of recruitment and intellectual polarization: (i) lexicalization, (ii) intertextual religionisation, and (iii) justification. Two main findings are revealed in this study. First, the application of CATA software into the linguistic investigation of texts contributes effectively to the understanding of the thematic and ideological messages pertaining to the analyzed text. Second, the computational analysis guarantees concise, credible, authentic and ample results than is the case if the analysis is conducted without the work of computer software. The paper, therefore, recommends the integration of CATA software into the linguistic analysis of the various types of texts.

Emotional User Experience in Web-Based Geographic Information System: An Indonesian UX Analysis

  • Lokman, Anitawati Mohd;Isa, Indra Griha Tofik;Novianti, Leni;Ariyanti, Indri;Sadariawati, Rika;Aziz, Azhar Abd;Ismail Afiza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.271-279
    • /
    • 2022
  • In the discipline of design science, the integration of cognitive, semantic, and affective elements is crucial in the conception and development of a product. Affective components in IT artefacts have attracted researchers' attention, but little attention has been given to Geographic Information Systems (GIS). This research was conducted to identify emotions in web-based GIS, and determine design influences on the emotions using Kansei engineering (KE). In the evaluation procedure, ten web-based GIS were used as specimens, and 20 Kansei words were used as emotional descriptors in the Kansei checklist. 50 participants were asked to rate their emotional responses towards the specimens on the Kansei checklist. Principal Component Analysis was used to discover the semantic structure of Kansei, in which dynamism and spaciousness were identified. Significant Kansei concepts were identified using Factor Analysis, in which dynamic & well-organized, refreshing, spacious, professional, and nautical-look were identified. Partial Least Square analysis has assisted the research in discovering the significant design influence to the Kansei. These findings provide designers and other stakeholders with valuable knowledge for strategizing future web-based GIS designs that incorporate user emotions.

Theoretical Validation of Inheritance Metric in QMOOD against Weyuker's Properties

  • Alharthi, Mariam;Aljedaibi, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.284-296
    • /
    • 2021
  • Quality Models are important element of the software industry to develop and implement the best quality product in the market. This type of model provides aid in describing quality measures, which directly enhance the user satisfaction and software quality. In software development, the inheritance technique is an important mechanism used in object-oriented programming that allows the developers to define new classes having all the properties of super class. This technique supports the hierarchy design for classes and makes an "is-a" association among the super and subclasses. This paper describes a standard procedure for validating the inheritance metric in Quality Model for Object-Oriented Design (QMOOD) by using a set of nine properties established by Weyuker. These properties commonly using for investigating the effectiveness of the metric. The integration of two measuring methods (i.e. QMOOD and Weyuker) will provide new way for evaluating the software quality based on the inheritance context. The output of this research shows the extent of satisfaction of the inheritance metric in QMOOD against Weyuker nine properties. Further results proved that Weyker's property number nine could not fulfilled by any inheritance metrics. This research introduces a way for measuring software that developed using object-oriented approach. The theoretical validation of the inheritance metric presented in this paper is a small step taken towards producing quality software and in providing assistance to the software industry.

Implementation of DevOps based Hybrid Model for Project Management and Deployment using Jenkins Automation Tool with Plugins

  • Narang, Poonam;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.249-259
    • /
    • 2022
  • Project management and deployment has gone through a long journey from traditional and agile to continuous integration, continuous deployment and continuous monitoring. Software industry benefited with the latest buzzword in the development process, DevOps that not only escalates software productivity but at the same time enhances software quality. But the implementation and assessment of DevOps practices is expository as there are no guidelines to assess and improvise DevOps application in software industries. Hence, there was a need to develop a hybrid model to assist software practitioners in DevOps implementation. The intention behind this paper is to implement the already proposed DevOps hybrid model using suggested tool chains including Jenkins, Selenium, GitLab, Ansible and Nagios automation tools through Jenkins project management environment and plugins. To achieve this implementation objective, a java application is developed with a web-based graphical interface. Further, in this paper, different challenges and benefits of Jenkins implementation shall also be outlined. The paper also presents the effectiveness of DevOps based Model implementation in software organizations. The impact of considering other automation tools and models can also be considered as a part of further research.

Business Environment of Public Sector Enterprises: Using the International Rankings for Evaluation

  • Shalimova, Nataliia;Kuzmenko, Halyna;Shalimov, Volodymyr;Reshetov, Valerii;Androshchuk, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.297-309
    • /
    • 2022
  • Taking into account the globalization of the economy and the intensification of European integration processes, it has been proved that an important part of evaluating the effectiveness of activity of public sector enterprises should be a comparative analysis of the overall operation environment, namely public procurement, economic environment and tax policy, with the relevant systems of other countries of the world. The indicators and components of international ratings "Doing Business", "Paying Taxes", "Benchmarking Public Procurement" have been studied. Different groups of indicators forming "Doing Business" and "Paying Taxes" in the context of the impact on public sector enterprises have been identified: those which fully comply with the need to evaluate the operating environment of public sector enterprises and those which should be used with restrictions, regarding the peculiarities of creating and functioning of public sector enterprises. A comparative analysis of the place of Ukraine, Lithuania and Slovenia among other countries of the world in accordance with the international rankings of "Doing Business", "Paying Taxes", "Benchmarking Public Procurement" have been made. It has been substantiated that the results of such comparative analysis will allow identifying risk areas, and relevant information can be used in developing of recommendations for improving the effectiveness of activity of public sector enterprises.

City Diplomacy in South Korea: Trends and Characteristics

  • Min-gyu Lee
    • Analyses & Alternatives
    • /
    • v.7 no.1
    • /
    • pp.171-200
    • /
    • 2023
  • This research aims to analyze the external activities of local governments in South Korea from the perspective of the developing trends in city diplomacy, contrary to the conventional and narrow concept regarding local government's international exchange and cooperation as a public diplomacy. In detail, this research intends to illustrate the following: first, to differentiate South Korean local governments' growing commitment to international affairs from public diplomacy; second, to highlight the integration of public diplomacy with other forms of diplomacy within the framework of city diplomacy. This research argues that city diplomacy in South Korea has gradually shown the following three trends and characteristics. First, South Korean local governments have recognized the importance of participating in multilateral diplomacy via city networks to find compelling solutions to non-traditional and transnational security threats. They perceive this external activity as an opportunity for policy sharing and problem-solving with foreign partners. Second, local governments in South Korea have been fostering various ways to institutionalize their involvement in foreign affairs and organizations, such as amendments to related laws and the launching of task forces, to pursue so-called sustainable and systematic international exchange and cooperation. Lastly, South Korean local governments have constructed multiple channels and multilevel governance in the form of public-private partnerships to enhance policy expertise and cope with diverse agendas.