• 제목/요약/키워드: personal computer security

검색결과 404건 처리시간 0.02초

Model Of Formation Of Digital Competence On The Basis Of Pedagogical Proceedings At The Present Stage Of Development Of Digitalization Of Society

  • Lytvyn, Valentyna;Khlystun, Olena;Prykhodkina, Nataliia;Poluboiaryna, Iryna;Bevz, Maryna;Kopeliuk, Oleh
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.219-223
    • /
    • 2021
  • The article discusses the pedagogical support for the formation of ICT competence assumes the individualization of students' training, due to their personal and professional needs and interests, and the provision of the necessary conditions and means to implement this process. A theoretical analysis is carried out and an analysis of experimental work on the implementation of the developed model for the formation of ICT competence is generalized specialists on the basis of pedagogical support.

Standards In The Psychological Structure Of The Personality Of Students

  • Liakisheva, Anna;Salamakha, Ihor;Malimon, Liudmyla;Khanykina, Nataliia;Fedorenko, Maryna;Makieshyna, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.301-305
    • /
    • 2021
  • Scientific space, one can observe the differentiation of the definition of the terms "value", "value orientations" because it does not yet have a clear standard definition. Many researchers have dealt with this topic, researched, analyzed, observed, and made conclusions. However, there is still a rich scope for research of such phenomena of personal structure as value orientations. Psychologists-researchers who, in their scientific, practical, and theoretical works, dealt with the topic of values and value orientations and came to the general conclusion that values are a structural component of a personality, with the help of which a person achieves a goal, sets this goal, and characterizes position in life. Saw the relationship between values and the basic structures of the personality, including value orientations-considered in values a system of orientation and personality attitudes.

Information as An Object of Legal Regulation in Ukraine

  • Iasechko, Svitlana;Ivanovska, Alla;Gudz, Tetyana;Marchuk, Mykola;Venglinskyi, Oleksandr;Tokar, Alla
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.237-242
    • /
    • 2021
  • The article deals with the problematic issues of defining information as an object of private relations. Definitions that they are intangible and non-consumable by nature, are inextricably linked to a specific material carrier are/or secured by the subject that transmits them, messages, and information that have quantitative and qualitative characteristics, and are capable of having a freight or another value, and in case of its illegal usage causing damage and moral harm.

Possibility of Inclusive Adaptation of The ABA Intervention at School

  • Saigh, Budor H.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.83-88
    • /
    • 2022
  • Applied Behaviour Analysis (ABA) is the applied science where strategies are derived from the principles of behaviour and are applied to improve meaningful social behaviours [3]. This study investigates the possible inclusive value of the use ABA in schools in Saudi Arabia. Interviews were conducted with two ABA therapists and a support teacher in order to address this possibility. From the research findings, it emerged how ABA is one of the cognitive-behavioural intervention models and therefore, can be generalised to other disorders or diagnoses and the applied behavioural analysis does have an inclusive value as it structures individualized activities for the increase of both personal and social skills and these activities allow the subject to work on his or her skills, which are, however, absolutely preparatory to the inclusion of the subject in the classroom context.

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

사물인터넷에서 개인 정보 보안 강화를 위한 위협 및 대응방안 (Threats and countermeasures for strengthening personal information security in the Internet of Things)

  • 임지수;박재경
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2023년도 제68차 하계학술대회논문집 31권2호
    • /
    • pp.599-600
    • /
    • 2023
  • 본 논문은 사물인터넷 환경에서 개인 정보 보안을 강화하기 위해 개인 정보 위협과 대응방안을 조사하는 것을 목표로 한다. 개인 정보의 위협으로는 무단 액세스, 데이터 위반, 데이터 집계 및 프로파일링, 추적 및 감시가 있다. 이에 대한 대응방안으로는 암호화, 개인 정보 보호 데이터 처리, 보안 통신 프로토콜 등을 연구되고 있다. 또한, 실증적 연구를 통해 사물인터넷 사용자의 개인 정보 보호 문제와 기존 전략의 효과를 평가하고 권장 사항을 도출한다. 본 논문은 사물인터넷 생태계에서 개인 정보 보안을 강화하기 위한 정보를 제공하며, 개인정보를 활용하는 사용자에게 도움을 줄 것으로 기대한다.

  • PDF

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

Experiment in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • 제24권8호
    • /
    • pp.54-60
    • /
    • 2024
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is showed with experiment in feasibility.