• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.036 seconds

Digital Competencies Required for Information Science Specialists at Saudi Universities

  • Yamani, Hanaa;AlHarthi, Ahmed;Elsigini, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.212-220
    • /
    • 2021
  • The objectives of this research were to identify the digital competencies required for information science specialists at Saudi universities and to examine whether there existed conspicuous differences in the standpoint of these specialists due to years of work experience with regard to the importance of these competencies. A descriptive analytical method was used to accomplish these objectives while extracting the required digital competency list and ascertaining its importance. The research sample comprised 24 experts in the field of information science from several universities in the Kingdom of Saudi Arabia. The participants in the sample were asked to complete a questionnaire prepared to acquire the pertinent data in the period between January 5, 2021 and January 20, 2021. The results reveal that the digital competencies required for information science specialists at Saudi universities encompass general features such as the ability to use computer, Internet, Web2, Web3, and smartphone applications, digital learning resource development, data processing (big data) and its sharing via the Internet, system analysis, dealing with multiple electronic indexing applications and learning management systems and its features, using electronic bibliographic control tools, artificial intelligence tools, cybersecurity system maintenance, ability to comprehend and use different programming languages, simulation, and augmented reality applications, and knowledge and skills for 3D printing. Furthermore, no statistically significant differences were observed between the mean ranks of scores of specialists with less than 10 years of practical experience and those with practical experience of 10 years or more with regard to conferring importance to digital competencies.

The Use of Innovative Technologies in Education

  • Stratan-Artyshkova, Tetiana;Bilyk, Ruslana;Vitsukaieva, Kateryna;Drozich, Iryna;Kalimanova, Olha;Vasiutynska, Yelena;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.93-100
    • /
    • 2022
  • The use of innovative technologies is one of the promising areas of education development, so the article clarifies the content of the terms "innovation" "pedagogical technology". Our goal is to justify the need to use innovative technologies in education. Innovative technologies are divided into four groups, depending on the appropriate form of educational activity for their use. The development of innovative pedagogical technologies at the present stage of education development should be carried out in accordance with the criteria of technological efficiency, which are presented in the article: scientific; systematic; guaranteed; manageable; mass. Based on the analysis of the process of formation of pedagogical education, the main trends in the information support of teachers in the system of pedagogical education were revealed. Its theoretical and methodological foundations were determined, promising directions and main ways of improving the information support of teachers' education as an organic component of continuous pedagogical education in Ukraine were justified. The conducted study of the state of information support for teachers allowed us to establish that the main functions of scientific and pedagogical information - analytical and predictive, integrative, operational and purposeful informing of various categories of specialists - teachers-are not being implemented enough. This is due to the versatility and complexity of the pedagogical process, the low level and limited range of development of systems of operational differentiated scientific and methodological services for various categories of teachers. Ways to improve the information function of teacher education are determined.

A Study on the Key Recovery System (Key Recovery 시스템에 관한 고찰)

  • 이임영;채승철
    • Review of KIISC
    • /
    • v.7 no.4
    • /
    • pp.45-58
    • /
    • 1997
  • 본고에서는 현재 여러 국가와 기업에서 논의되고 있는 Key Recovery시스템이 제안된 배경과 미국에서의 시행 정책과 현황 등을 살펴보고 Key Recovery시스템을 구성하는 주요 요소와 실제 시스템의 구현시에 고려되어야 할 부분들을 보다 일반적인 관점에서 논의하고자 한다.

  • PDF

조기 경보와 위협관리

  • 채현주
    • Review of KIISC
    • /
    • v.15 no.1
    • /
    • pp.17-22
    • /
    • 2005
  • 웜, 바이러스, 해킹 등 아직 일어나지 않은 사이버 위협을 예측하여 소기 예·경보를 통해 능동적으로 방어할 수 있는 위협관리시스템(TMS; Threat Management System)이 보안업계의 새로운 관심분야로 떠오르고 있다. 본 논문에서는 이 위협관리시스템의 개념과 기능에 대해 선명하고, 이를 통한 조기 경보의 방법을 논의하고자 한다.

Securith Management on a Network System (네트워크 시스템의 보안 관리)

  • 박태규;강창구;김대호
    • Review of KIISC
    • /
    • v.6 no.3
    • /
    • pp.95-114
    • /
    • 1996
  • 본 논문에서는 OSI에서 규정하는 네트워크 관리 기능별 5개 영역 중 보안 관리 기능의 정의, 보안관리 작업의 이점, 보안 관리 수행 절차, 공중 데이터 망에 연결시 유용한 보안 유지 사항, 보안 관리 도구으 예, 보안 사건의 보고와 OSI에서 수행하고 있는 표준화 작업 내용으로서 네트워크 프레임워크, JTC1/SC21의 관리 내용 개요를 소개한다.

  • PDF

Analysis of Data Structure for Secure X.435 EDI System (X.435 EDI 정보보호 서비스 데이터 구조 분석)

  • 이정현;윤이중;김대호;이대기
    • Review of KIISC
    • /
    • v.5 no.3
    • /
    • pp.69-85
    • /
    • 1995
  • ITU-T X.435 EDI 시스템에서의 정보보호 서비스는 크게 MHS 정보보호 서비스와 Pedi 정보보호 서비스로 나눌 수 있다. 본 논문에서는 X.435 EDI 정보보호 서비스의 종류를 살펴보고, 이들의 데이타 구조의 분석뿐만 아니라 정보보호 서비스를 제공하기 위해 사용되는 각 필드들이 의미하는 바를 분석, 정리하였다.

  • PDF