• Title/Summary/Keyword: Social Security Network

Search Result 526, Processing Time 0.028 seconds

Leveling Up the Information Culture of Social Work Bachelors

  • Bartosh, Olena;Povidaichyk, Oksana;Kozubovska, Iryna;Shandor, Fedir;Afanasiev, Dmytro;Bodnar, Olesia;Katsora, Oleksandr;Oros, Oleksandra
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.222-230
    • /
    • 2021
  • The article reviews the issue of formation of information culture of social work bachelors in the process of their professional training. The main internal / external factors that determine the need for the information culture formation of social workers-to-be have been identified. To determine the levels of information culture formed in bachelors of social work criteria and their indicators have been substantiated. The model of information culture formation in BSW has been developed and implemented in Ukrainian universities under the following pedagogic conditions: organized informational environment; interconnection between general and professionally-directed courses; curriculum includes course directed on IC formation. The model contained interconnected components: aim - to achieve higher level of information culture formed; specific principles; content, interactive methods and forms of organization of educational process, methods of control and correction; components of information culture. The implemented mastered learning procedure has contributed to the leveling up of information culture formed in social work bachelors.

Dynamic Remote User Trust Evaluation Scheme for Social Network Service (소셜 네트워크에서 원거리 노드를 고려한 동적 사용자 신뢰도 평가 스킴)

  • Kim, Youngwoong;Choi, Younsung;Kwon, Keun;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.373-384
    • /
    • 2014
  • The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users make, is spreaded rapidly in many the social network uses. This causes many users to suffer material or psychological damages. Because of openness in the social network, there will be higher risk of the privacy invasion. Therefore, sensitive information should be transferred or provided only to reliable users. In general, because many users exchange among one hops, many researches have focused on one hop's trust evaluation. However, exchanges between users happen not only one joint bridege but also far nodes more than two nodes on account of dense network and openness. In this paper we propose the efficient scheme combining transitivity and composability for remote users.

How Do Children Interact with Phishing Attacks?

  • Alwanain, Mohammed I
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.127-133
    • /
    • 2021
  • Today, phishing attacks represent one of the biggest security threats targeting users of the digital world. They consist of an attempt to steal sensitive information, such as a user's identity or credit and debit card details, using various methods that include fake emails, fake websites, and fake social media messages. Protecting the user's security and privacy therefore becomes complex, especially when those users are children. Currently, children are participating in Internet activity more frequently than ever before. This activity includes, for example, online gaming, communication, and schoolwork. However, children tend to have a less well-developed knowledge of privacy and security concepts, compared to adults. Consequently, they often become victims of cybercrime. In this paper, the effects of security awareness on users who are children are investigated, looking at their ability to detect phishing attacks in social media. In this approach, two Experiments were conducted to evaluate the effects of security awareness on WhatsApp application users in their daily communication. The results of the Experiments revealed that phishing awareness training has a significant positive effect on the ability of children using WhatsApp to identify phishing messages and thereby avoid attacks.

Modern Management Technologies in the System of Ensuring the Security in the Context of Socio-Economic Development and the Digital Economy

  • Panchenko, Vladimir;Dombrovska, Svitlana;Samchyk, Maksym;Mykhailyk, Nataliia;Chabaniuk, Odarka
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.213-219
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern management technologies into the security system in the context of socio-economic development and digitalization of the economy. Socio-economic development and a high level of security include growth in income, labor productivity, production volumes, increased competitiveness, changes in the institutional environment, consciousness, activity, social security, the quality of the education system, healthcare, etc. Despite the root cause of economic development, it is not an end in itself, but a tool for ensuring social development. Gaining access for citizens to education, health care, observance of the principles of equality and justice, ensuring protection are directly dependent on the level of economic well-being, the level of economic potential of the country or regions. The research methodology involved the use of both theoretical and practical methods. As a result of the study, the key elements of the introduction of modern management technologies into the security system in the context of socio-economic development and digitalization of the economy were identified.

A method for the protection of the message in social network service(SNS) using access control and hash-chain (SNS에서 접근제어 및 해시체인을 이용한 메시지 보호 기법)

  • Jeong, Hanjae;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • As social network service(SNS) has grown rapidly, the variety information being shared through SNS. However, the privacy of individuals can be violated due to the shared information through a SNS or the post written in the past at the SNS. Although, many researches concerned about it, they did not suggest key management and access control especially. In this paper, we propose the method for the protection of the message in SNS using access control and hash-chain.

An Analysis on Online Social Network Security

  • Rathore, Shailendra;Singh, Saurabh;Moon, Seo Yeon;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.196-198
    • /
    • 2016
  • Online social networking sites such as MySpace, Facebook, Twitter are becoming very preeminent, and the quantities of their users are escalating very quickly. Due to the significant escalation of security vulnerabilities in social networks, user's confidentiality, authenticity, and privacy have been affected too. In this paper, a short study of online social network attacks is presented in order to identify the problems and impact of the attacks on World Wide Web (WWW).

On the Scale in the Kingdom of Saudi Arabia: Facebook vs. Snapchat

  • Alghamdi, Deena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.131-136
    • /
    • 2021
  • This research aims to analyse the practices adopted by social media users in the Kingdom of Saudi Arabia (KSA), specifically users of Facebook and Snapchat. To collect data from participants, a questionnaire was used, generating 915 responses. The analysis of the data shows a clear preference for Snapchat over Facebook in the KSA, where 89% of the participants have accounts on Snapchat compared to 66% of them with accounts on Facebook. Moreover, the preference for Snapchat over Facebook has been clearly shown in the daily usage of participants, where 83% of those with Snapchat accounts can be described as very active users. They have accessed their Snapchat accounts at least once a day compared to only 15% of Facebook users. Different reasons were provided by the participants explaining the practices they adopted. We believe that such research could help social media applications' designers and policy makers to understand the behaviour of users in the KSA when using social media applications and the rationale behind their behaviour and preferences. This understanding could help improve the performance of current applications and new ones.

Countermeasure strategy for the international crime and terrorism by use of SNA and Big data analysis (소셜네트워크분석(SNA)과 빅데이터 분석을 통한 국제범죄와 테러리즘 대응전략)

  • Chung, Tae Jin
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.25-34
    • /
    • 2016
  • This study aims to prevent the serious threat from dangerous person or group by responding or blocking or separating illegal activities by use of SNA: Social Network Analysis. SNA enables to identify the complex social relation of suspect and individuals in order to enhance the effectiveness and efficiency of investigation. SNS has rapidly developed and expanded without restriction of physical distance and geo-location for making new relation among people and sharing large amount of information. As rise of SNS(facebook and twitter) related crimes, terrorist group 'ISIS' has used their website for promotion of their activity and recruitment. The use of SNS costs relatively lower than other methods to achieve their goals so it has been widely used by terrorist groups. Since it has a significant ripple effect, it is imperative to stop their activity. Therefore, this study precisely describes criminal and terrorist activities on SNS and demonstrates how effectively detect, block and respond against their activities. Further study is also suggested.

SNS disclosure of personal information in M2M environment threats and countermeasures (M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안)

  • Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2014
  • It appeared with the development of IT skills to help the social network SNS(Social Network Service) on the online form. Many people around the world and in the business environment changes is the emergence of social networks are bringing. And the rapid development of the idea, but are insignificant for the security threats that are used by many people in many companies, and social network services. In addition, although it is true that this connection is increased from the number of mobile machines to the development of M2M, that is not recognized for that vulnerability. To evaluate and identify vulnerabilities against security threats and countermeasures for the SNS access the social network on the M2M After looking for privacy and in the present.

The Plan of Social Security network for Prevention of School Violence (학교폭력 예방을 위한 사회안전망의 구상)

  • Kim, Tae-Jin
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.169-192
    • /
    • 2007
  • School Violence is one of the most serious problems faced by Korean. As this serious problem becomes social issue in nation, many researchers have tried to find out the most effective solution of that problem and the reasons for why prevention of school violence are failed in such mind-hurting activities. The government and NGO proposed many the alternative to prevent the school violence. But the effectiveness of the alternatives art questionable. Last year Busan Metropolitan Police Agency and Busan Education Administration proposed new alternative in united cooperation which is namely Administration proposed new alternative in united cooperation which is namely 'school police' for school violence. School Police is composed of the retired teachers and ex-police officer, to do a prevention activity of school violence, which is expected to effectively curtail school violence in the assigned school. It is first networking try to prevent of school violence as a team of police and teachers in Korea. But the type of Korean school police system is different from American's school police, like as LASPD which is of sworn police officers. Korean school police is to employ a kind of school liaison officers. Though 'School Police System' got good reaction from students and citizen in Busan, It has some defects to be solved in future. So it hard to note that their efforts have been successful in curtailing the prevalence of school violence. In this paper, I present the new type of new 'Social Security Network Model' for school violence by repairing of 'korean school police system'. The problem of the school violence is not the problem of the school but the problem of society. In such viewpoints, It is important to plan a security network model which is participate in police officers, teachers, community and government. To prevent school violence effectively, I propose this new social security network model which based on theory of Community Oriented Policing, aggressive policing and CPTED technique.

  • PDF