• Title/Summary/Keyword: Security Test

Search Result 1,256, Processing Time 0.03 seconds

The Psychometric Properties of Distance-Digital Subjective Happiness Scale

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.211-216
    • /
    • 2021
  • This study intended to test the structure of the latent factor of a subjective happiness scale and the stability of invariance across groups of students' classifications (gender and students' status). In the large, non-clinical sample (619), students completed the subjective happiness scale. The (CFA) confirmatory factor analysis was used to investigate the factor-structure of the measure, and multiple-group confirmatory factor analysis (MGCFA) model was used to test the stability of invariance across groups of students classifications. The findings of the CFA indicated support for the original one-factor model. Additional analyses of the MGCFA method support the measurement (configural, metric and strong) invariant and practical invariant components of this model. There was an invariant across gender. There was partially invariant across groups of students' statuses. The scale exists in both groups to assess the same concepts of (single and married), excluding Items 3 and 4. Given that this study is the first investigation for the structure of the subjective happiness scale.

Effects of Flipped Classroom Strategy on Students' Achievements in the Computer and Information Technology Course and Their Attitudes Towards It

  • Alqarni, Ali Suwayid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.157-164
    • /
    • 2021
  • This endeavor is an attempt to explore the effect of flipped classroom strategy (FCS) on (a) academic achievement in the computer and information technology course and (b) students' attitudes towards this strategy. The sample of the study consisted of 64 students, divided into two groups: experimental and control groups. Two instruments were used to collect the data: a test and a questionnaire. The test was used to measure the students' achievement and the questionnaire to measure their attitudes towards the FCS. The results show statistically significant differences at the level of 0.05 in support of the experimental group at all Bloom's levels. Similarly, students' positive attitude towards the FCS was evident. Therefore, expanding this strategy in different courses is highly recommended because it positively impacts students' achievements. Organizing workshops and designing courses that encourage teachers to implement the strategy in the classroom and develop their technical skills are also recommended.

Designing an Electronic Course and Its Impact on Developing University Students' Computational Thinking Skills

  • Al-Zahrani, Majed bin Maili bin Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.15-20
    • /
    • 2022
  • The study investigated the effects of differences in some electronic course designs on university students' Computational Thinking Skills (CTS). Towards this end, the researcher adopted the experimental research design of a quasi-experimental of two experimental groups. The first group was taught an e-course designed in a sequential pattern, and the other group's course was designed according to the holistic model. A CTSs test was prepared to collect the relevant data, and the data were analyzed statistically using these tests- Pearson correlation Mann Whitney and Alpha Cronbach. Results revealed statistically-significant differences at the level α=0.05 between the mean scores of the first and second experimental groups in favor of the latter in the CTS test. The findings gave ground to put forward some salient recommendations, including the need to expand computational thinking in universities' educational process. It also recommends urging faculty members to enhance e-courses in the educational process and provide technical support to students and faculty members.

The Psychometric Properties of Effectiveness Scale in Distance-Digital

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.149-156
    • /
    • 2021
  • This study intended to test the structure of the latent factor of an effectiveness scale and the stability of invariance across groups of students' classifications (gender and levels of education). In the large, non-clinical sample (850), students completed the effectiveness scale. The (CFA) confirmatory factor analysis was used to investigate the factor-structure of the measure, and multiple-group confirmatory factor analysis (MGCFA) model was used to test the stability of invariance across groups of students' classifications. The findings of the CFA indicated support for the original four-factor model. Additional analyses of the MGCFA method support the measurement (configural, metric and strong) invariant and practical invariant components of this model. There was an invariant across gender. There was partially invariant across groups of levels of education. The scale exists in groups of levels of education assess the same concepts of, excluding Items 15 and 10. Given that this study is the first investigation for the structure of the effectiveness scale.

Developing EFL Students' Vocabulary and Reading Comprehension Skills within an Interactive Learning Environment

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.145-152
    • /
    • 2022
  • The current study investigates the effects of an interactive learning environment on EFL students' vocabulary acquisition and reading comprehension skills. The study utilized a quasi-experimental design. The sample consisted of 41 students enrolled in the English program at Umm Al-Qura University studying Reading in EFL course in Summer 2018/2019. The sample was randomly divided into two groups: A control group consisting of 21 students and an experimental group of 20 students. The results revealed statistically significant differences at (α≤ 0.01) between the mean scores of the experimental group and the control group in the posttest of the vocabulary test and the reading comprehension test favoring the experimental group. Finally, the study concluded with a call for more studies on modern technologies in teaching EFL skills in the Saudi context.

A New Methodology for Software Reliability based on Statistical Modeling

  • Avinash S;Y.Srinivas;P.Annan naidu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.157-161
    • /
    • 2023
  • Reliability is one of the computable quality features of the software. To assess the reliability the software reliability growth models(SRGMS) are used at different test times based on statistical learning models. In all situations, Tradational time-based SRGMS may not be enough, and such models cannot recognize errors in small and medium sized applications.Numerous traditional reliability measures are used to test software errors during application development and testing. In the software testing and maintenance phase, however, new errors are taken into consideration in real time in order to decide the reliability estimate. In this article, we suggest using the Weibull model as a computational approach to eradicate the problem of software reliability modeling. In the suggested model, a new distribution model is suggested to improve the reliability estimation method. We compute the model developed and stabilize its efficiency with other popular software reliability growth models from the research publication. Our assessment results show that the proposed Model is worthier to S-shaped Yamada, Generalized Poisson, NHPP.

security Guard, Job Form Environment, Job Form Satisfaction (민간경비원의 직무환경과 직무만족도의 관계)

  • Park, Jun-Seok;Choi, Hyun-Sik;Kim, Kyong-Tae;Kim, Sang-Gyun
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.193-206
    • /
    • 2007
  • The purpose of this study is to examine the Relationship between Job Form Satisfaction and Job Form Environment of Security Guard. The total 210 subjects are composed of 160 men and 50 women who work at private security company in Seoul, Kyongi. The job form satisfaction test made by Smith et al(1969) JDI(Job Descriptive Index) test was used which had been translated and modified by Park Jin Hee(1994) & Lee Dong Yeop(2003) for Korean situation. Also, one-way ANOVA were used for data analysis. These are conclusions of this study drawn from the data analysis through the methods and the process mentioned above. First, there are partial differences in the subordinate factors of job form satisfaction agreeing with the characteristic of demography. In accordance with sex, the higher is men group, in accordance with marriage, the higher is non-marriage, in accordance with age, the higher is 36-50's group, in accordance with scholastic ability, the higher is graduate school group, in accordance with income, the higher is 3 million won group. Second, there are partial differences in the effect of job form environment on satisfaction of security guard. In accordance with service career, the higher is 16-20age group, in accordance with position, the higher is general member, in accordance with main exercise, the higher is Hapkido group, in accordance with type, the higher is general charge group.

  • PDF

A Study on Performance Improvement of ConTracer Using Taguchi Method (다구찌법을 이용한 컨테이너화물 안전수송장치 ConTracer의 성능향상에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shon, Jung-Rock;Shin, Joong-Jo;Lee, Ho-In;Kim, Gwang-Pil;Kim, Chae-Soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.23-31
    • /
    • 2009
  • Since 9.11 terrorist attacks against the USA, the new paradigm for "supply chain security" has been established. And at the same time a lot of researches are being made on supply chain security by many foreign companies or research institutes. However, domestically the terms "supply chain security" themselves are not yet familiar, and the paradigm of security are not being used in the logistics, while little researches are being made on them But recently along with development of "ConTracer," a supply chain security technology, which is to be used as the equipment for container cargo transportation safety based on RF1D technology, related researches have begun to be activated. The key issues for the development of equipment for container transportation safety are to obtain both a high recognition rate and enough recognition distance. To this end, this study has tested the ConTracer (433 MHz type and 2.4 GHz type) by using Taguchi Method. According to our test results, in the case of 433 MHz type, it is a little more effective that the reader faces to the front-right side, and in the case of 2.4 GHz, reader direction does not make difference in the view of sensitivity. The test also has proved that it is better that antenna location, as expected, is to be installed on the outside for both types alike.

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection (정보보호 사전점검 활성화를 위한 점검항목 개선 연구)

  • Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.933-940
    • /
    • 2015
  • IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre-inspection aims to assure stability and reliability for user and supplier of new IT services by proposing development stage which considers security from design phase. Existing 'Information Security Pre-inspection' (22 domains, 74 control items, 129 detail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were executed for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of 'Information Security Pre-inspection' which aims to construct prevention system for new information system. As a result, an improved 'Information Security Pre-inspection' is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvement requirements and reconstitution needs.

Research on DDoS Detection using AI in NFV (인공지능 기술을 이용한 NFV 환경에서의 DDoS 공격 탐지 연구)

  • Kim, HyunJin;Park, Sangho;Ryou, JaeCheol
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.837-844
    • /
    • 2018
  • Recently, the cloud technology has made dynamical network changes by enabling the construction of a logical network without building a physical network. Despite recent research on the cloud, it is necessary to study security functions for the identification of fake virtual network functions and the encryption of communication between entities. Because the VNFs are open to subscribers and able to implement service directly, which can make them an attack target. In this paper, we propose a virtual public key infrastructure mechanism that detects a fake VNFs and guarantees data security through mutual authentication between VNFs. To evaluate the virtual PKI, we built a management and orchestration environment to test the performance of authentication and key generation for data security. And we test the detection of a distributed denial of service by using several AI algorithms to enhance the security in NFV.