• Title/Summary/Keyword: Security education

Search Result 1,765, Processing Time 0.023 seconds

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.50-62
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities' students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The study's findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.105-118
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The studys findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

A Study for Mobile Agent System to Support Security Service (보안 서비스를 제공하기 위한 이동 에이전트 시스템의 설계에 관한 연구)

  • Kim, Hyun-Bae
    • Journal of The Korean Association of Information Education
    • /
    • v.2 no.1
    • /
    • pp.130-137
    • /
    • 1998
  • An agent is a computer program that acts autonomously on a computer system. A mobile agent is not bound to the system where it begins execution. It has an ability to transport itself from on e system in a network to another. Mobile agent system solve the network traffic problem. Moreover, the agent may utilize the object services of the destination agent system. In this study the mobile agent system is introduced to support security service.

  • PDF

Causal model of Urban Households' Subjective Financial Security (체계론에 근거한 주관적 재정안정도에 대한 인과적 모형)

  • 김연정
    • Journal of the Korean Home Economics Association
    • /
    • v.29 no.4
    • /
    • pp.151-165
    • /
    • 1991
  • The purpose of this study was to examine causal model of resources and demands, family financial management and subjective financial security among urban households based on system theory. For this purpose, the data were collected by the questionnaire sheets. 455 housewives participated this survey in Seoul. And the data were analyzed by various statistical methods such as Frequency, Percentile, ANOVA, F-test, Pearson's correlation analysis, Multipe Regression Analysis, and Path Analysis. The results of this research were as follows: 1. There were significant differences in the Subjective Financial Security according to resource variables and demand yariables. Those variables were such as housewive's age, education, occupation, househead's occupation, per capita income, aspiration, expectancy, perception of financial progress and relative deprivation. 2. The higher family financial management level, the higher level of Subjective Financial security. And the higher family financial management plan·implement level, the higher level of Subjective Financial security. 3. The lower debt/asset ratio, the higher level of Subjective Financial security. 4. Aspiration, per capita income an financial managemant variables showed direct effect on Subjective Financial security among all variables affecting the urban households' Subjective financial security. While housewive's education level, aspiration, per capita income and husband's occupation affected indirectly on the Subjective Financial security through family financial managemant.

  • PDF

Priority of the Government Policy to support Industrial Security - Focus on a companies' demand and efficiency of policy - (산업보안 지원 정책 결정의 우선 순위 - 기업 수요와 효율성을 중심으로 -)

  • Kim, Chang-Ho;Yu, Jai-Hwan
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.155-178
    • /
    • 2015
  • This study surveyed the subject of companies' industrial security on priorities of the government policy for the confidentiality of corporate and the necessity of expanding the government support for the industrial security. In determining the priority, we should consider all opinions of companies, individuals, societies, and governments that associated with the confidentiality. Especially in industrial security, companies are the most significant beneficiaries and consumers of security policy and it would be the basis for supporting on policy-making. As a result, we analyzed the 50 valid questionnaires collected from security personnel of Korean corporations and 'Enhance support for education and promotion of human resource (On/Off-Line)', 'Establish Security management and Security measures', and 'Enhance Security professionals status via qualifications/certifications' are shown as 1st, 2nd, 3rd priority of government policy to protect Corporate confidential information including its customer information. All respondents of the study says that the Government support for Industrial Security should be enlarged.

  • PDF

Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study

  • Hakami, Mazen;Alshaikh, Moneer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.299-309
    • /
    • 2022
  • Human factor represents a very challenging issue to organizations. Human factor is responsible for many cybersecurity incidents by noncompliance with the organization security policies. In this paper we conduct a comprehensive review of the literature to identify strategies to address human factor. Security awareness, training and education program is the main strategy to address human factor. Scholars have consistently argued that importance of security awareness to prevent incidents from human behavior.

Theoretical Principles Of Using Innovative Modern Technologies In Higher Education Institutions

  • Komar, Olha;Bazhenkov, Ievgen;Vnukova, Оlga;Kolomoiets, Halyna;Yanchyshyn, Anatolii;Polishchuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.185-190
    • /
    • 2021
  • The article is assigned to a prelude to the joke of effective pedagogical technologies in professional education in the minds of її continuity. Analyzed the definitions "innovation", "technology", "pedagogical technology", "Innovation pedagogical technology". Blocks have been added, which are stored in innovation processes in the light. The significant role of innovation in education is stated. Presented warehouses pedagogical technologies: conceptual, conceptual-processual and professional. The purpose of introducing innovative technologies into the educational process of vocational education institutions has been clarified. The reasons for finding and implementing innovative pedagogical technologies in education are analyzed.

Technologies Of Educational Activity Development: Theoretical Fundamentals

  • Kravchuk, Nadiia;Kinakh, Nelia;Bortniuk, Tetiana;Fedosenko, Karina;Burlaka, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.177-180
    • /
    • 2021
  • The theoretical and methodological provisions that allow to systematically and comprehensively study the postgraduate pedagogical education of teachers; the essence and features of postgraduate pedagogical education of teachers of diverse training institutions, providing professional and pedagogical training of this category of pedagogical personnel, have been determined; regularities, principles and conditions for the implementation of promising directions of development of the system of postgraduate pedagogical education for teachers of diverse training have been developed; developed technological support for the development of postgraduate pedagogical education for teachers of multidisciplinary training; identified and substantiated promising directions for the development of postgraduate pedagogical education for teachers of multidisciplinary training in vocational education, due to the modernization.

Modern Management Technologies in the System of Ensuring the Security in the Context of Socio-Economic Development and the Digital Economy

  • Panchenko, Vladimir;Dombrovska, Svitlana;Samchyk, Maksym;Mykhailyk, Nataliia;Chabaniuk, Odarka
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern management technologies into the security system in the context of socio-economic development and digitalization of the economy. Socio-economic development and a high level of security include growth in income, labor productivity, production volumes, increased competitiveness, changes in the institutional environment, consciousness, activity, social security, the quality of the education system, healthcare, etc. Despite the root cause of economic development, it is not an end in itself, but a tool for ensuring social development. Gaining access for citizens to education, health care, observance of the principles of equality and justice, ensuring protection are directly dependent on the level of economic well-being, the level of economic potential of the country or regions. The research methodology involved the use of both theoretical and practical methods. As a result of the study, the key elements of the introduction of modern management technologies into the security system in the context of socio-economic development and digitalization of the economy were identified.

The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone (정보시스템 관련 교육의 정도가 보안 우려 및 온라인 거래 의도에 미치는 영향 - 인터넷 이용과 스마트 폰 이용의 비교 분석)

  • Jung, Seung-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.145-161
    • /
    • 2012
  • This study aims to explore how the degree of education related to information systems and the Internet literacy affect perceived security risk and how these three variables affect online transaction intention based on the Technology Acceptance Model (TAM). Since using smartphone to purchase necessary products is increasing, the study provided two different cases of using the existing Internet and smartphone to buy products. As a result of an empirical test, the degree of information system education, internet literacy, and perceived security risk had significant effects on online transaction intention mediating perceived usefulness and perceived ease of use. Unlike the expectation, the more people have education related to information systems, the more they have knowledge about hacking or cases of privacy infringement, leading to even more concerns about security, thereby believing the Internet transactions require much effort. The more the education about information system, the more we have concerns about security; therefore, perceived security risk have a positive(+) effect on perceived usefulness not a negative(-) effect. Lastly, while the degree of education related to information systems has relations with the recognition of the usefulness of the Internet transaction, the study showed that there are no relations of recognizing the usefulness and the ease of use of smartphone.