• Title/Summary/Keyword: Security test

Search Result 1,258, Processing Time 0.021 seconds

Challenges Experienced Use of Distance-Learning by High School Teachers Responses to Students with Depression

  • Almaleki, Deyab A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.192-198
    • /
    • 2021
  • Trustless, depression, happiness is a normal human emotion that everyone experiences at times. People face problems and hard circumstances every day due to an environment, social life, or traumatic developments in their lives. This study focused on a particular type of inconsistency patterns of behavior that experiences' students during the school time. Some students find depression interferes with their learning and test taking to such an extent that their grades are seriously affected. This study examined the awareness and readiness of a sample of Saudi Arabian high school teachers to recognize, understand, and respond to the ways in which students may respond to testing situations with depression. Findings suggest teachers learn from experience to use both direct and indirect ways to identify students with depression; employ test preparation and test taking strategies to help students reduce depression; and reach out to parents for additional assistance where teacher strategies are not sufficient.

The Effect of Methods of Estimating the Ability on The Accuracy and Items Parameters According to 3PL Model

  • Almaleki, Deyab A.;Alomrany, Ahoud Ghazi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.93-102
    • /
    • 2021
  • This study aimed to test method on the accuracy of estimating the items parameters and ability, using the Three Parameter Logistic. To achieve the objectives of the study, an achievement test in chemistry was constructed for third-year secondary school students in the course of "natural sciences". A descriptive approach was employed to conduct the study. The test was applied to a sample of (507) students of the third year of secondary school in the "Natural Sciences Course". The study's results revealed that the (EAP) method showed a higher degree of accuracy in the estimation of the difficulty parameter and the abilities of persons higher than the MML method. There were no statistically significant differences in the accuracy of the parameter estimation of discrimination and guessing regarding the difference of the two methods: (MML) and (EAP).

An Analysis of the Differences in the Steps of the Demographic Characteristics in Security Company (인구통계학적 특성에 따른 시큐리티업 종사자의 차이 분석 : 서비스지향성과 서비스품질 및 경영성과를 중심으로)

  • Min, Jae-Ki;Han, Sang-Cheul
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.141-177
    • /
    • 2009
  • The purpose of this study is to identify the effects of service orientation perceived by employees of security companies on service quality and management performance based on service orientation theory. To test this, 345 participants were sampled from the security companies located in Seoul and Gyeonggi area using stratified cluster random sampling, and then frequency analysis, exploratory factor analysis, t-test, one-way ANOVA analysis and path analysis of the resulting data were conducted using SPSS 15.0 program. Conclusions derived from the aforementioned analytical methods are as follows: there were difference in service orientation according to demographic characteristics. And results from analyses showed that service leadership, which is sub factor of service orientation, was highly evaluated by the male group, and the customer service, by the participants of having college education and more, and the service system, by the group of the income bracket between 1.51 and 2 Million Won.

  • PDF

Developing the Test Module of PSAM for $Hipass^{PLUS}$ Card System (하이패스플러스카드 시스템을 위한 PSAM 시험 모듈 개발)

  • Lee Ki-Han;Suh Hyun Kyo;Yoo Chang Hee;Lee Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.2 s.3
    • /
    • pp.73-84
    • /
    • 2003
  • Due to the problems of existing prepaid plastic card issued by Korea Highway Company, the prepaid electronic payment system using a smart card, called HipassPLUS Card, was developed to overcome the Problems. PSAM is one of the main component of the systea which can retrieve the value from HipassPLUS card, transmit the transaction data to CSAM, and store the accumulated account lists. For the safety of the elecoonic payment system, the functions of PSAM should be faultless. This paper developed a test module including the test method, the test checklist, and the test procedure. The test module examines the functionality and security of the payment mechanism to insure that the value stored in HipassPLUS card can be raid to PSAM by the merchants and the standardized SAM. The test module also inspects the transmission mechanism to send and store the transaction data kom PShM to CSAM correctly and safely. Ihe module is designed to test the standard items using the test checklists for PSAM. The test items and the test checklists of PShM was selected under the provision of the specification of Korea Highway Company and ISO standard. Ihe evaluation on PSAM using the test module indicates that PSAM satisfies the evaluation criteria on the quality characteristics of the functionality, security, and compatibility.

  • PDF

A Study on the Relation between the Number of First Aid Training and the Performance of Facilities Security Personnel (시설보안요원의 응급처치교육이수와 직무수행 관계에 관한 연구)

  • Kim, Sin-Hye;Han, I-Jun
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.91-108
    • /
    • 2019
  • The purpose of this study is to investigate the relationship between the number of first aid training and safety performance. The researcher's questionnaire consisted of three variables: necessity of first aid education, application to security practice, and improvement of job satisfaction. In this study, Chronbach's Alpha coefficients were calculated to measure the internal validity for the reliability of the questionnaire. In order to verify the validity of the measured variables, exploratory factor analysis was carried out using the Berimax rotation method. The mean variance extracted AVE and the conceptual reliability CR value of the measurement result variables were both above the allowable reference value of 0.5 and it was judged to be a good test in terms of intensive validity. As a result of the hypothesis test, the standardization coefficient was 1.106 for 'necessity of first aid education ⇒ applied to security practice work', and 'applied to security work practice ⇒ improvement of job satisfaction' was 1.063 and the relationship of hypothesis 1 hypothesis 2 was significant (+), Respectively. Therefore, in order to increase the job satisfaction of security related workers, it is necessary to support first aid education and to receive first aid education.

The Effects of Customer Aggression on the Job Stress and Emotional Burnout of Security Guards in Casino (카지노 고객의 공격성이 시큐리티 종사자의 직무스트레스 및 소진에 미치는 영향)

  • Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.87-107
    • /
    • 2010
  • The purpose of this study is to examine the effects of customer aggression on the job stress and emotional burnout of security guards in casino. Investigating tools used questionnaire, the sampling was drawn from security guards at 6 casinos which had more than 30 security guards. To this study, the partisans of the study were 269 people. Data for creation for questionnaire is completely computed processing and using SPSS 15.0 Windows that is social studies scholastic mantle command program after imputed encoding according to each purpose. Analyzing techniques to use for analysis of data enforced technology figure analysis, factor analysis, reliability analysis, t-test, one-way ANOVA, multiple regression analysis. Through data analysis by such method and procedure, conclusion that gets in this research is as following. First, exposure that is difference that keep in mind partially as result that verify difference of aggression according to demographical features, job stress and emotional burnout that is security guard's in casino. Second, exposure that is difference that keep in mind as statistical as result that verify effect that customer aggression gets in job stress of security guards in casino. Third, exposure that is difference that keep in mind as statistical as result that verify effect that customer aggression gets in emotional burnout of security guards in casino.

  • PDF

Study on the Difference of Physical Fitness and Cardiovascular Risk Factors for the Security Guards' Working Type (경호원의 근무유형에 따른 체력과 심혈관질환 위험인자의 차이 연구)

  • Kim, Kyong-Tae;Park, Jun-Suk
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.31-49
    • /
    • 2011
  • The subjects consisted of 60 healthy men who absence of cardiopulmonary diseases, orthopedic diseases, and metabolic diseases. The difference of physical fitness, body composition, cardiovascular risk factors, and psychological characteristics for security guards' working type were examined using one-way ANOVA through SPSS 12.0 version and was treated for the post hoc test when the difference appeared significantly. According to the result, first, there were higher level for the physical fitness according to the security guards' position and it increases body composition and cardiovascular risk factors from higher position. Second, physical fitness level is higher, body composition and cardiovascular risk factors is lower in the security guards for the field service than the security guards on inside duty according to the security guards' working type. Third, it decreases body composition and cardiovascular risk level when the physical fitness level is getting increase for the security guards. In conclusion, it needs to have a physical activity with aerobic system for the security guards of leading members and inside service to decrease the overweight or obesity and cardiovascular risk level.

  • PDF

Security APIs for Security Services in Ultra Light-weight Environment (초경량 환경의 보안 서비스 지원을 위한 보안 API)

  • Kim, Won-Young;Lee, Young-Seok;Lee, Jae-Wan;Seo, Chang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.485-492
    • /
    • 2008
  • Computers used fer light-weight computing environments are considerably limited in resources and performance running in ubiquitous environment. Because of the limited resources, it is difficult to apply existing security technologies to the light-weight computers. In this paper, light-weight security software is implemented using RC-5 encryption and SHA-1 authentication algorithm which is appropriate for light-weight computing environments. The design of components based on security software of a light-weight computer application and the test-bed for security software are presented. The simulation verifies the correctness of the security software. The architecture of the light-weight and reconfigurable security software for light-weight computer applications is proposed. The proposed security software is small size and provides reconfigurable security library based on the light-weight component and the software manager that configures software platform is loaded with the library at the time it is needed.

On the SEED Validation System (SEED 구현 적합성 검증 시스템에 관한 연구)

  • Kim, Yeok;Jung, Chang-Ho;Jang, Yoon-Seok; Lee, Sang-Jin;Lee, Sung-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.69-85
    • /
    • 2003
  • In this paper, we discuss a validation test for cryptographic algorithms. The cryptographic algorithms decide on the security and the confidence of a security system protecting sensitive information. So. the implementation of cryptographic algorithms is very critical of the system. The validation lest specifies the procedures involved in validating implementations of the cryptographic standards and provides conformance testing for components or procedures of the algorithm. We propose a SEED Validation System(SVS) to verify that the implementation correctly performs the SEED algorithm. The SVS is composed of two types of validation tests, the Known Answer test and the Monte Carlo test. The System generates the testing data for the Known Answer tests and the random data for the Monte Carlo tests. This system can be used to validate and certify the cryptographic product.

Improved Application Test Data Range Selection Method in a Non-Personal Information Identification Environment (개인정보 비식별 환경에서의 개선된 응용프로그램 테스트 데이터 범위 선정 방법)

  • Baek, Song-yi;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.823-834
    • /
    • 2020
  • In the past, when the personal information leakage incident of the three card companies, the computer program development was followed by the same strict electronic financial supervision regulations as the operating environment. However, when developing a computerized program, the application data is being verified with the integrity of the test data being compromised because the identification of the scope of conversion of the test data associated with the application is unclear. Therefore, in this paper, we proved by presenting a process and algorithm for selecting a range of sufficient test data conversion targets associated with a specific application.