• Title/Summary/Keyword: Security Activities

Search Result 980, Processing Time 0.098 seconds

Online Learning after One Year of Digital Schooling in Romania: A Survey

  • Simionescu, Corina;Danubianu, Mirela;Marcu, Daniela;Turcu, Corneliu-Octavian
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.726-731
    • /
    • 2021
  • Due to the COVID-19 pandemics, Romanian schools functioned online since March 2020, with more or less all school activities being implemented online, using the digital resources and technology. Although none of the key factors involved in education (teachers, pupils, parents) were prepared (emotionally, technically, economically etc.), online education was imposed ad a necessity to continue the teaching-learning-evaluation process, and teachers at all school levels were forced to rapidly adapt to online schooling. In this paper, we aim to investigate the perception of all three educational actors (pupils, parents and teachers) regarding the efficacy of online teaching and learning, based on a survey with 7701 respondents. Research data is relevant for online schooling in Romania between March 2020 and March 2021.

Information Security Activities of The Implementation Phase (구현단계의 정보보호 활동)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.747-748
    • /
    • 2016
  • The information protection scheme established in the design phase in the information security point of view, it is necessary to clearly determine whether implemented in the implementation phase. This paper goes in charge of how this information protected structure. This implementation is made be in a network, servers, applications, databases, and each client area.

  • PDF

On the Application of Public Search Measures to Detect and Obtain Information

  • Kozytska, Olena;Tsilmak, Olena;Protsenko, Olena;Yankovyi, Mykola;Lysenko, Аndrii;Shulzhenko, Assol
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.109-112
    • /
    • 2021
  • The article considers the state of legislation that regulates the use of public methods of obtaining information by authorized state bodies. The correlation of public investigative (search) actions with operative-search measures as concepts denoting the application of public methods of obtaining information has been studied. In addition, it argues the need for more detailed delineation and legislative regulation of public investigative (search) actions and operational and investigative measures at the legislative and departmental levels. The purpose of the article is to analyze certain provisions of the Law of Ukraine "On operational and investigative activities" to identify inconsistencies in the content of the text of the law in order to correct and prevent ambiguity in the theory and practice of law enforcement.

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (익명 통신로를 이용한 Escrow 전자화폐)

  • 김춘수;박춘식;전희종
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.29-46
    • /
    • 1999
  • Most of the previous researches for the electronic cash system guarantee unconditional untraceability for the purpose of individual privacy. Such untraceable electronic cash system that only focuses on untraceability, however, has side effect such as money laundering, criminal activities. We present a escrow cash model using anonymous channel that supports not only untaceability but also crime prevention, and prove the efficiency of our scheme relative to previous escrow cash systems.

Continuous Human Activity Detection Using Multiple Smart Wearable Devices in IoT Environments

  • Alshamrani, Adel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.221-228
    • /
    • 2021
  • Recent improvements on the quality, fidelity and availability of biometric data have led to effective human physical activity detection (HPAD) in real time which adds significant value to applications such as human behavior identification, healthcare monitoring, and user authentication. Current approaches usually use machine-learning techniques for human physical activity recognition based on the data collected from wearable accelerometer sensor from a single wearable smart device on the user. However, collecting data from a single wearable smart device may not provide the complete user activity data as it is usually attached to only single part of the user's body. In addition, in case of the absence of the single sensor, then no data can be collected. Hence, in this paper, a continuous HPAD will be presented to effectively perform user activity detection with mobile service infrastructure using multiple wearable smart devices, namely smartphone and smartwatch placed in various locations on user's body for more accurate HPAD. A case study on a comprehensive dataset of classified human physical activities with our HAPD approach shows substantial improvement in HPAD accuracy.

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks

  • Singh, Devendra Kumar;Shrivastava, Manish
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.272-276
    • /
    • 2021
  • Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.

Information and Communication Technologies for the Innovative Development of Tourism Training in the Context of COVID-19

  • Krupa, Oksana;Panchenko, Vladimir;Dydiv, Iryna;Borutska, Yuliia;Shcherbatiuk, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.262-268
    • /
    • 2022
  • The main purpose of the study is to determine information and communication technologies for the innovative development of tourism training in higher education institutions in the context of COVID-19. Innovative development is associated with the rejection of well-known cliches, stereotypes in teaching, upbringing and personal development, creates new standards for personal-creative, individually directed tourism activities, develops pedagogical technologies implemented in this activity. As a result, the main aspects of information and communication technologies for the innovative development of tourist training in higher education institutions in the context of COVID-19 were characterized.

Modern Technologies of Personnel Management in the Conditions of Digital Economy Development

  • Boikivska, Galyna;Mokhonko, Ganna;Andrushkiv, Roman;Lytvynova, Larysa;Guk, Olga
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.283-289
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern technologies in the personnel management system in the context of the development of the digital economy. The human factor is one of the most important resources of any organization, which has a significant impact on the success of its activities. It is people who are the source of advantages that provide the company with victory in the competition. Therefore, the primary task of the organization's management should be the formation of effective personnel management systems. As a result, the main features of the introduction of modern technologies into the personnel management system in the context of the development of the digital economy were identified.

Emotional Preferences Analysis Using Kansei in Designing The Appearance of User Interface for E-Voting Application

  • Abdurrohman, Abdurrohman;Rahman, Aedah Abd;Hadiana, Ana;Lokman, Anitawati Mohd
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.193-198
    • /
    • 2021
  • The application of e-Voting plays an important role in order to support democracy activities in Indonesia, such as elections at different levels. E-Voting has the function of providing better service to people in order to participate in elections. This research attempts to develop the appearance of the user interface of e-Voting based on users' emotional preferences using Kansei Engineering. Kansei Engineering is used in this research to analyze emotional feelings regarding e-Voting applications' presented Kansei words and give a recommendation on the most suitable user interface to be considered in their development. This research observed two main users' emotional feelings ("calm" and "formal") selected from ten Kansei words. The final recommendation is a conceptual element designed for designing e-Voting applications based on the Kansei word "calm".

State Regulation of Banking Business in the Context of Social and Digital Transformation of the Economy

  • Rushchyshyn, Nadiya;Kulinich, Oksana;Tvorydlo, Olha;Mikhailov, Alexander;Viunyk, Olha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.67-72
    • /
    • 2022
  • The main purpose of the study is to analyze the main aspects of state regulation of the banking business in the context of social and digital transformation. One of the key elements of the functioning of the economy of any country are banks that ensure the redistribution of financial resources and stimulate economic growth. However, the banking sector, like other activities, is dynamic and depends on the pace of development and forms of technological progress that affect the forms and types of information and digital technologies, as well as the globalization and remoteness of banking services. Accordingly, the need for effective implementation of the latest technologies becomes relevant, which will not only help increase consumer satisfaction with the banking product, but also ensure the development of the country's financial sector. As a result of the study, trends in the development of state regulation of the banking sector in the digital economy were identified.