• Title/Summary/Keyword: Academic Security

Search Result 333, Processing Time 0.022 seconds

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

A Study Related on Relationship between New Terrorism's and Security Strategy for Korea (뉴테러리즘의 민간시큐리티 연계와 발전방안)

  • Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.1-13
    • /
    • 2008
  • Conclusion is like below. First, as a private security area's mutual relationship and development device, it is necessary to bring up corresponding-terror expert. Second, a privatized corresponding-terror research center is necessary. Third, the importance of privatization's role for the corresponding-terror prevention law establishment. It is considered that a diversified examination research that can minimize a violation of human rights by bringing up various corresponding-terror expert, paradigm shift of workers related security area, and construct corresponding- terror education equipment as well as education content, it is not a special group's authority, should be continued by a following research. Academical area of terrorism's construction is necessary. You need to approach by private initiatively boldly with the academic world as an active mutual cooperation politically, culturally, socially, internationally, etc, rather than developing national institute initiatively. Also, in a following research, an academical research about a correlation of crime, war, terror should be done deeply, variously. It is necessary to establish an academic foundation of terror study.

  • PDF

Military Security Policy Research Using Big Data and Text Mining (빅데이터와 텍스트마이닝 기법을 활용한 군사보안정책 탐구)

  • Kim, Doo Hwan;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.23-34
    • /
    • 2019
  • This study utilized big data, one of the new technologies of the Fourth Industrial Revolution as a policy direction study related to the military security of the Army. By utilizing Text mining and analyzing military security trends in domestic and foreign papers, it will be able to set policy directions and reduce trial and error. In this study, we found differences in domestic and international studies on military sucurity. At first, Domestic research has shown that in the course of the fourth industrial revolution, there is a strong interest in technological security, such as IT technology in security and cyber security in North Korea. On the other hand, Foreign research confirmed that policies are being studied in such a way that military sucurity is needed at the level of cooperation between countries and that it can contribute to world peace. Various academic policy studies have been underway in terms of determining world peace and security levels, not just security levels. It contrasted in our immediate confrontation with North Korea for decades but suggest complementary measures that cannot be overlooked from a grand perspective. Conclusionally, the direction of academic research in domestic and foreign should be done in macro perspective under national network cooperation, not just technology sucurity research, recognizing that military security is a policy product that should be studied in a security system between countries.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.4
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

Blockchain System for Academic Credit Bank System (학점은행제를 위한 블록체인 시스템)

  • Son, Ki-Bong;Son, Min-Young;Kim, Young-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.5
    • /
    • pp.11-22
    • /
    • 2020
  • The academic credit banking system is an educational system to implement a lifelong learning society. Students who meet the requirements of this system can achieve academic degrees equivalent to those of junior colleges or four-year universities. Credits and degree information of these students are recorded and managed by the central institution. However, this system can cause security problem such as hacking due to centralized management. In this paper, we propose an academic credit banking system which can manage credits and degree information based on blockchain technology. In the proposed system, credits and degree information are stored in block and managed in the public ledger in a permanent manner. Blocks are connected in the form of blockchain on a distributed network to improve security problems such as hacking and manipulation. Also, the efficiency of credit bank management can be increased because the functions of the central institution are distributed to the network participants. The prototype of the proposed system was implemented on the Go-Ethereum platform and experimentally verified the blockchain information among participating organizations using smart contracts.

Evaluating AI Techniques for Blind Students Using Voice-Activated Personal Assistants

  • Almurayziq, Tariq S;Alshammari, Gharbi Khamis;Alshammari, Abdullah;Alsaffar, Mohammad;Aljaloud, Saud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.61-68
    • /
    • 2022
  • The present study was based on developing an AI based model to facilitate the academic registration needs of blind students. The model was developed to enable blind students to submit academic service requests and tasks with ease. The findings from previous studies formed the basis of the study where functionality gaps from the literary research identified by blind students were utilized when the system was devised. Primary simulation data were composed based on several thousand cases. As such, the current study develops a model based on archival insight. Given that the model is theoretical, it was partially applied to help determine how efficient the associated AI tools are and determine how effective they are in real-world settings by incorporating them into the portal that institutions currently use. In this paper, we argue that voice-activated personal assistant (VAPA), text mining, bag of words, and case-based reasoning (CBR) perform better together, compared with other classifiers for analyzing and classifying the text in academic request submission through the VAPA.

A Study on Real Time Checking and Feedback Method of Academic Achievement in Programming Class (프로그래밍 수업에서 학업 성취도의 실시간 점검 및 피드백 방안에 관한 연구)

  • Jin, Myung Sook;Lee, Miyeong;Oh, Suk;Ahn, You Jung;Kim, Kyong Ah;Kim, Ji Sim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.495-496
    • /
    • 2018
  • 전문대학의 프로그래밍 수업에서 시험효과를 이용하여 학습자의 집중도를 높이고 긴장감을 유발하며 학업 성취도를 높일 수 있는 실시간 학업성취도 테스트와 피드백 방안을 제안한다. SNS와 간단한 필기구를 활용한 시험으로 교수자는 수업 전과 후의 학습자의 성취도의 변화를 쉽게 파악하며 학습자는 실시간으로 SNS를 통해 피드백을 받을 수 있다.

  • PDF

CSR and Governance Principles in Business Administration According to Deans of BA Schools Perspective: BA of Northern Border University as Case Study

  • AL-Ajlouni, Mahmoud Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.219-222
    • /
    • 2021
  • The study shed the light on the information required by Governance Principles and Corporate Social Responsibilities of human resources department from the point deans' perspectives of BA colleges during the discussion the publication of studies that academic members earlier submitted in many journals as authors of similar studies talking about business schools and CSR in Saudi Arabia universities. The study sample was the deans of business schools in northern border university and interviews were used to collect data. Findings showed that CSR in business colleges within an integrated set of research products in the human resource that he owns, support the mechanisms of social services from a purposeful pioneering and creative perspective. In addition, the success of business administration colleges in preparing these cadres depends on the college's senior leadership represented by its dean and its administrative policy to motivate academic staff and students to develop the CSR and governance.

Obstacles to Using Interactive Whiteboards for Teachers of Students with Learning Disabilities

  • ALQurashi, Amani A.;Aboalola, Nawal A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.348-352
    • /
    • 2022
  • This study aims to identify the obstacles to using interactive whiteboards for teachers of students with learning disabilities (LDs) in the Makkah region and to delineate any differences in the levels of these obstacles that can be attributed to the study variables: teachers' gender, academic qualifications, age, and years of experience. The researchers applied the descriptive survey approach to a sample of 123 teachers of LD students. To analyze the results, frequencies, averages, standard deviations, and relative weights were calculated. The results of the study indicated that the levels of the obstacles to using interactive whiteboards for teachers of LD students were moderate. No statistically significant differences in the levels of these obstacles were related to the variables of gender or age, whereas significant differences were found based on academic qualifications and years of experience.

Developing Student-Teacher Interaction Through Task-Based Instruction

  • Alsamadani, Hashem A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.47-52
    • /
    • 2022
  • The current study investigates how student-teacher interaction can be developed through task-based teaching in undergraduate students' Saudi teaching and learning context. An experiment was conducted for five weeks on 85 male undergraduate students at a Saudi public university based in Jeddah, Saudi Arabia. The study investigated different types of student-teacher interaction through task-based teaching (speaking activities). The results revealed that the experimental group (43 students) evinced much more enthusiasm, willingness, engagement and readiness in their inclass participation than their peers in the control group (42 students). The student-teacher interaction also helped students to be more responsive to general and specific topics in speaking activities. The study recommends that decision-makers in education make student-teacher interaction part of the student's monthly assessment. It also recommends that more efforts be made to foster the awareness of students, teachers, and parents awareness of the academic and non-academic importance of interaction. One final recommendation of the research is that student-teacher interaction should be more emphasized and integrated into the school curriculum and adopted as a critical teaching strategy.