• Title/Summary/Keyword: Security Practice

Search Result 374, Processing Time 0.022 seconds

Parental Involvement and Education of Children with Intellectual Disabilities in Saudi Arabia

  • Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.259-265
    • /
    • 2022
  • This research aims to increase understanding of family participation in special education programs, to gain a deeper understanding of the programs themselves, and to determine the consequences of the research findings. It addresses the opportunities for families to participate in their children's learning journey and focuses on enhancing the experience of families participating in the education of students with intellectual disabilities. This study interviews four teachers of students with intellectual disabilities, and three important themes emerge from their discussion of whether parents should participate in special education programs for their children. The findings of this study have several important implications for future practice.

Distance Learning for Students with Intellectual Disability during the Emerging Coronavirus Pandemic: Opportunities and Challenges from Parents' Perspectives

  • Alnefaie, Adhwaa M.;Bagadood, Nizar H.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.85-92
    • /
    • 2021
  • Distance learning for students with intellectual disabilities can prove beneficial, particularly if adjusted to their educational characteristics and needs. This study seeks to identify the views of parents living in Saudi Arabia, regarding the opportunities offered by distance learning for students with intellectual disabilities, alongside their challenges during the Covid-19 pandemic. The research employed qualitative methods using semi-structured interviews with six parents of students with intellectual disabilities. The results revealed a number of both opportunities and challenges, including issues related to the family, in addition, the data highlighted difficulties related to the educational process (i.e. a lack of variety of educational methods) and technical issues related to access to the Internet and the insufficient computer skills of both teachers and students. The findings have several important implications for future practice, including the need for training workshops for parents concerning the online platform, as well as further research to determine students' perspectives of their experiences with distance learning.

An Updated Evidence-based Practice Review on Teaching Mathematics to Students with Intellectual Disabilities

  • Alhwaiti, Mohammed M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.255-265
    • /
    • 2022
  • Educational programs for students with intellectual disabilities have undergone drastic changes in pursuit of the general curriculum. Accordingly, teachers in various fields, including mathematics, strive to find effective methods that enhance learning. The objective of this systematic review is to examine the field of teaching mathematics to students with intellectual disabilities to investigate relevant effective teaching strategies and required teaching skills. To achieve this goal, studies published during the period 2018-2021 were reviewed. Findings indicate the inclusion of nine studies that met the inclusion criteria out of 55 studies. The included studies found that the system of least prompts (SLP) in conjunction with feedback and error correction, and schema-based instruction are generally the most effective strategies in teaching mathematical skills to students with intellectual disabilities. Addition is the most targeted skill, followed by subtraction and algebra problem solving. The least targeted skills are multiplication, recognition of geometric shapes, calculating price after discount, rapid recognition of numbers, and rapid problem solving. The paper provides recommendations and suggests venues of future research.

Opportunities of Organization of Classes in Foreign Languages by Means of Microsoft Teams (in Practice of Teaching Ukrainian as Foreign Language

  • Olha Hrytsenko;Iryna Zozulia;Iryna Kushnir;Tetiana Aleksieienko;Alla Stadnii
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.160-172
    • /
    • 2024
  • The characteristic aspects of learning a foreign language require special resources and tools for online learning. Criteria for choosing educational platforms depend on key elements of an academic subject area. Microsoft Teams (hereafter, MT) educational platform is competitive one because it meets most of the needs that arise during the formation of a secondary linguistic persona. Due to the large number of corporate programs, there are a successful acquisition of language skills and the implementation of all types of oral activities of students. A significant MT advantage is the constant analysis and monitoring of the platform of participants' needs in the educational process by developers. The article highlights MT advantages and disadvantages. The attention is drawn to individual programs, which, in the authors' opinion, are the most successful to learn writing, reading, speaking, listening, as well as organize classes that meet needs of modern foreign students.

Multiclass Botnet Detection and Countermeasures Selection

  • Farhan Tariq;Shamim baig
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.205-211
    • /
    • 2024
  • The increasing number of botnet attacks incorporating new evasion techniques making it infeasible to completely secure complex computer network system. The botnet infections are likely to be happen, the timely detection and response to these infections helps to stop attackers before any damage is done. The current practice in traditional IP networks require manual intervention to response to any detected malicious infection. This manual response process is more probable to delay and increase the risk of damage. To automate this manual process, this paper proposes to automatically select relevant countermeasures for detected botnet infection. The propose approach uses the concept of flow trace to detect botnet behavior patterns from current and historical network activity. The approach uses the multiclass machine learning based approach to detect and classify the botnet activity into IRC, HTTP, and P2P botnet. This classification helps to calculate the risk score of the detected botnet infection. The relevant countermeasures selected from available pool based on risk score of detected infection.

Factors contributing to participation in food assistance programs in the elderly population

  • Hong, Seo Ah;Kim, Kirang
    • Nutrition Research and Practice
    • /
    • v.8 no.4
    • /
    • pp.425-431
    • /
    • 2014
  • BACKGROUND/OBJECTIVES: The study objectives were to examine the participation rate in food assistance programs and explore the factors that contribute to such participation among the Korean elderly population. SUBJECTS/METHODS: The study sample comprised 3,932 respondents aged 65 years or older who were selected from a secondary data set, the fourth Korean Welfare Panel Study (KoWePS). The factors, related to participation in programs were examined based on the predisposing, enabling and need factors of the help-seeking behavior model. Multiple logistic regression analysis was used to select the best contributors among the factors related to program participation. RESULTS: The predisposing rate in food assistance programs was 8.5% (7.1% for men and 10.4% for women). When all variables were included in the model, living without spouse, no formal education, low income, having social security benefits and food insecurity in elderly men, and age, low income, having social security benefits and feeling poor in elderly women were significantly related to a higher tendency to program participation. CONCLUSIONS: The predisposing and need factors, such as living without spouse, low education level, food insecurity and feeling poor were important for program participation, as well as enabling factors, such as household income and social security benefits. A comprehensive approach considering these factors to identify the target population for food assistance programs is needed to increase the effectiveness and target population penetration of these programs.

A study on the model of homebound senior's meal satisfaction related to the quality of life

  • Lee, Sun-Mee;Joo, Na-Mi
    • Nutrition Research and Practice
    • /
    • v.6 no.4
    • /
    • pp.357-365
    • /
    • 2012
  • This study was conducted to develop a construct model regarding the daily activities, emotional security provided by food, enjoyment of food, level of satisfaction with delivered food, and the quality of life of homebound seniors who benefitted from meal delivery programs. The data were analyzed by SAS 9.2 and the Structural Equation Model (SEM), which was created by Analysis of Moment Structure (AMOS) 5.0 packages. The reliability of the data was confirmed by an exploratory factor analysis and through a Cronbach's alpha coefficient, and the measurement model proved to be appropriate by a confirmatory factor analysis of the measurement model in conjunction with AMOS. The results of the correlations between all the variables showed significant positive correlations (P < 0.05). The path analysis demonstrated that the daily activities (P < 0.01) and the emotional security created by food (P < 0.05) had positive correlations with the foodservice satisfaction (P < 0.05), while the daily activities (P < 0.05), the sense of emotional security made by food (P < 0.05), and food enjoyment (P < 0.05) also presented significant positive correlations with the quality of life. However, the food service satisfaction was shown to directly, but not significantly, affect the quality of life. This revealed that the current meal delivery programs needed to be improved in several directions.

Design and implementation on Safety assesment system for security threat analyzing (보안 위험분석을 위한 안정성 평가 시스템 설계 및 구현)

  • Cho, Kyoung-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.333-339
    • /
    • 2007
  • Risk of damage on information system being grow according to increasing its dependence rate on most of organization. On this work, make planed for a safety assessment system in which information protection management system and threat analyzing method. Also, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization, an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.

  • PDF

Defending Non-control-data Attacks using Influence Domain Monitoring

  • Zhang, Guimin;Li, Qingbao;Chen, Zhifeng;Zhang, Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3888-3910
    • /
    • 2018
  • As an increasing number of defense methods against control-data attacks are deployed in practice, control-data attacks have become challenging, and non-control-data attacks are on the rise. However, defense methods against non-control-data attacks are still deficient even though these attacks can produce damage as significant as that of control-data attacks. We present a method to defend against non-control-data attacks using influence domain monitoring (IDM). A definition of the data influence domain is first proposed to describe the characteristics of a variable during its life cycle. IDM extracts security-critical non-control data from the target program and then instruments the target for monitoring these variables' influence domains to ensure that corrupted variables will not be used as the attackers intend. Therefore, attackers may be able to modify the value of one security-critical variable by exploiting certain memory corruption vulnerabilities, but they will be prevented from using the variable for nefarious purposes. We evaluate a prototype implementation of IDM and use the experimental results to show that this method can defend against most known non-control-data attacks while imposing a moderate amount of performance overhead.

Cost-Effective and Active Security Verification Framework for Web Application Vulnerabilities (웹 애플리케이션 취약점 분석을 위한 비용 효과적인 능동 보안 검수 프레임워크)

  • Han, KyungHyun;Nguyen, Trong-Kha;Joe, Hun;Hwang, Seong Oun;Lim, Chaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.189-196
    • /
    • 2016
  • Many companies have struggled to manage Web vulnerabilities and security incidents have also frequently happened. The current inspection methods are mainly based on the OWASP vulnerabilities. In practice, however, it is very difficult to cope with frequent changes of Web applications. In this paper, we first investigate the existing quantification of Web application vulnerabilities and verification process. Then we propose an improved inspection framework which is focused on removing essential and realistic vulnerabilities and active verification process.