• Title/Summary/Keyword: Security Courses

Search Result 116, Processing Time 0.023 seconds

The Study of a Development Plan of the Industrial Security Expert System (산업보안관리사 자격제도 발전 방안에 대한 고찰)

  • Cho, Yong-Sun
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.175-207
    • /
    • 2014
  • This paper focuses on the study of a development direction of the industrial security Expert system. First of all, in order to manage Industrial security system, we need to have law, criminology, business and engineering professionals as well as IT experts, which are the multi-dimensional convergence professionals. Secondly, industrial organizations need to have workforce who can perform security strategy; security plan; security training; security services; or security system management and operations. Industrial security certification system can contribute to cultivate above mentioned professional workforce. Currently Industrial Security Expert(ISE) is a private qualification. However, the author argued that it have to be changed to national qualification. In addition, it is necessary that the system should be given credibility with verifying the personnel whether they are proper or not in the their field. In terms of quality innovation, it is also necessary that distinguish the levels of utilization of rating system of the industrial security coordinator through a long-term examination. With respect to grading criteria, we could consider the requirements as following: whether they must hold the degree of the industrial security-related areas of undergraduate or postgraduate (or to be); what or how many industrial security-related courses they should complete through a credit bank system. If the plan of completing certain industrial security-related credits simply through the credit bank system, without establishing a new industrial security-related department, has established, then industrial security study would be spreaded and advanced. For private certification holders, the problem of the qualification succeeding process is important matter. Additionally, it is necessary to introduce the certifying system of ISMS(Industrial Security Management System) which is a specialized system for protecting industrial technology. To sum up, when the industrial security management system links the industrial security management certification, industrial security would realize in the companies and research institutions dealing with national key technology. Then, a group synergy effect would occurs.

  • PDF

The Level of ELMS Success in Satisfying Students at Al-Jouf University During the Corona Crisis

  • Azim, Zeinab M. Abdel;Shahin, Osama R.;Khalaf, Mohamed H. Ragab;Taloba, Ahmed I.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.241-249
    • /
    • 2022
  • The current research attempts to measure the level of the acceptance of the Blackboard System (BBS) during the Corona crisis, and whether this is one of the reasons for the low use of the BBS at Al-Jouf University. To achieve this, the technology accepting model in the time of crisis (TAMTC) has been proposed to measure the degree of acceptance by students, which was then applied to a random sample of 339 of such. The results show a high level of student acceptance, despite their lower use of the system. The research also highlights the importance of upgrading e-courses and that the discontinuation of exam disqualification of students is secondary to their poor course attendance.

Experience of e-Learning during Lockdown for Students with Intellectual Disabilities

  • Alharthi, Emad M.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.33-38
    • /
    • 2022
  • This study examines the impact of e-learning on the educational level of students with intellectual disabilities from the viewpoint of their teachers. The study sample consisted of seven teachers: two working in primary school, two in middle school, and three in secondary school. The research applied a qualitative approach, using interviews with the participants. The results showed that the following are required for the effective use of e-learning: firstly, appropriate training courses need to be offered to teachers, students, and families and secondly, it is vital students are provided with the appropriate digital devices to maintain contact with their teachers. The study concludes by recommending the development of educational applications and/or programs capable of supporting teachers and students in their use of e-learning.

Designing an Electronic Course and Its Impact on Developing University Students' Computational Thinking Skills

  • Al-Zahrani, Majed bin Maili bin Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.15-20
    • /
    • 2022
  • The study investigated the effects of differences in some electronic course designs on university students' Computational Thinking Skills (CTS). Towards this end, the researcher adopted the experimental research design of a quasi-experimental of two experimental groups. The first group was taught an e-course designed in a sequential pattern, and the other group's course was designed according to the holistic model. A CTSs test was prepared to collect the relevant data, and the data were analyzed statistically using these tests- Pearson correlation Mann Whitney and Alpha Cronbach. Results revealed statistically-significant differences at the level α=0.05 between the mean scores of the first and second experimental groups in favor of the latter in the CTS test. The findings gave ground to put forward some salient recommendations, including the need to expand computational thinking in universities' educational process. It also recommends urging faculty members to enhance e-courses in the educational process and provide technical support to students and faculty members.

The Use of Blackboard by Students During the COVID-19 Pandemic

  • Alghamdi, Deena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.319-325
    • /
    • 2022
  • By using the Blackboard (BB) system in the education sector, the educational process for both academics and students is facilitated. Two data resources were used to evaluate the use of the BB system by students of Umm Al-Qura University: statistical reports issued by the university and an online questionnaire. A total of 989 students from all colleges and different programmes provided by the university responded to the questionnaire survey. According to our findings, most students did not use the BB before the pandemic. Therefore, the sudden conversion to the BB system required intensive training courses. After the data analysis, the relationship between the use of the BB system before the pandemic and the problems students faced during the lockdown was revealed. The most critical issues raised by the respondents were: (1) "The voice of the lecturer went on and off during BB collaborate class", (2) "internet connection of the lecturer went on and off during BB collaborate class" and (3) "High possibility of IT problems during exams".

Effects of Gamification-Based Learning on Learners' Achievement Motivation at First-Grade Intermediate Level

  • Al-Sulami, Sami Ben Shamlan Bakhit
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.266-276
    • /
    • 2022
  • The study aimed to pinpoint the effects of an educational environment based on gamification on developing achievement motivation among first-grade intermediate students. Using an achievement motivation scale, the study adopted a quasi-experimental design with experimental and control groups. The sample consisted of 52 students selected randomly from the first-grade intermediate students. They were studying in public intermediate schools in Jeddah at the time of this study. They were divided into two groups. The control group (n=24 respondent), and the experimental group (n=28 respondent). The results showed statistically significant differences at the level α ≥ 0.05 between the mean scores of the experimental group and the control group in the posttest of the achievement motivation measurement in favor of the experimental group. The study recommended using gamification in designing computer curricula and courses across educational stages in Saudi Arabia. It also recommends training the computer and information technology teachers on using gamification in their teaching.

Evaluation of Blackboard Use by Faculty Members at Umm Al-Qura University During the COVID-19 Pandemic

  • Deena Alghamdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.32-38
    • /
    • 2023
  • Blackboard provides a collaborative environment for teaching in terms of assessment and communication and can improve learning outcomes. To evaluate the Blackboard use of faculty members at Umm Al-Qura University, data were collected from two channels: statistical reports issued by the university and an online questionnaire. The questionnaire survey respondents were 187 faculty members from all colleges in the university. The findings show that most faculty members did not use Blackboard before the pandemic; therefore, the sudden conversion to the use of Blackboard required intensive training courses. In addition, accompanying Blackboard use with other applications such as WebEx is preferable, especially for administrative tasks such as departmental board meetings and seminars.

Hints-based Approach for UML Class Diagrams

  • Sehrish Abrejo;Amber Baig;Adnan Asghar Ali;Mutee U Rahman;Aqsa Khoso
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.9-15
    • /
    • 2023
  • A common language for modeling software requirements and design in recent years is Unified Modeling Language (UML). Essential principles and rules are provided by UML to help visualize and comprehend complex software systems. It has therefore been incorporated into the curriculum for software engineering courses at several institutions all around the world. However, it is commonly recognized that UML is challenging for beginners to understand, mostly owing to its complexity and ill-defined nature. It is unavoidable that we need to comprehend their preferences and issues considerably better than we do presently to approach the problem of teaching UML to beginner students in an acceptable manner. This paper offers a hint-based approach that can be implemented along with an ordinary lab task. Some keywords are highlighted to indicate class diagram components and make students understand the textual descriptions. The experimental results indicate significant improvement in students' learning skills. Furthermore, the majority of students also positively responded to the survey conducted in the end experimental study.

Hints based Approach for UML Class Diagrams

  • Sehrish Abrejo;Amber Baig;Adnan Asghar Ali;Mutee U Rahman;Aqsa Khoso
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.180-186
    • /
    • 2024
  • A common language for modelling software requirements and design in recent years is Unified Modeling Language (UML). Essential principles and rules are provided by UML to help visualize and comprehend complex software systems. It has therefore been incorporated into the curriculum for software engineering courses at several institutions all around the world. However, it is commonly recognized that UML is challenging for beginners to understand, mostly owing to its complexity and ill-defined nature. It is unavoidable that we need to comprehend their preferences and issues considerably better than we do presently in order to approach the problem of teaching UML to beginner students in an acceptable manner. This paper offers a hint based approach that can be implemented along with an ordinary lab task. Some keywords are heighted to indicate class diagram component and make students to understand the textual descriptions. The experimental results indicate significant improvement in students learning skills. Furthermore, majority of students also positively responded to the survey conducted in the end experimental study.

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF