Filters








70,656 Hits in 5.8 sec

Design and Implementation of Ethical Values Created Curriculum Development to Improve Mobile Security

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Medicinal imaging has assumed a key job in the direction of MIS strategies to expand the specialists' spatial introduction and help with the distinguishing proof of basic life systems and pathology.  ...  In this exploration we present a by and large relevant calculation which plans to furnish specialists with constant 3D perception of complete organ misshapen utilizing 3D optical fix pictures with constrained  ...  Poteat and Donna Woo providing the necessary facilities for the preparation of the paper.  ... 
doi:10.35940/ijitee.b1229.1292s419 fatcat:mnxzan6hgnhfbo3vjpc6m7nvoy

Security Knowledge Classification Framework for Future Intelligent Environment
미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계

Onechul Na, Hyojik Lee, Soyung Sung, Hangbae Chang
2015 The Journal of Society for e-Business Studies  
The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.  ...  Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology.  ...  Recent trends in information security thus need to address both these kinds of vulnerabilities in an environment where they are proliferating due to industry and technology convergence [2, 7, 8] .  ... 
doi:10.7838/jsebs.2015.20.3.047 fatcat:2zmmlhg7v5bebatunb5zinf6vy

Software Engineering Ethics Competency Gap in Undergraduate Computing Qualifications within South African Universities of Technology

Senyeki M. Marebane, Robert T.
2021 International Journal of Advanced Computer Science and Applications  
This study analyses curriculum documents to determine the extent to which entry-level undergraduate computing qualifications of Universities of Technology (UoTs) in South Africa provide opportunities to  ...  The results show that the coverage of the various categories of software engineering ethics by UoT computing qualifications for software development is insufficient, incomplete and superficial, providing  ...  This suggests unethical behaviors in South African software development environments from a lack of ethical awareness, likely due to deficiencies in computing qualification curricula.  ... 
doi:10.14569/ijacsa.2021.0120474 fatcat:kb67izw6tvhdbidlil7tspp5aq

IT Security and Privacy Education [chapter]

Louise Yngström
1996 IFIP Advances in Information and Communication Technology  
This paper gives and overview of new developments within university education in IT Security, and analyses in particular what is meant by interdisciplinary approaches.  ...  An ever repeated problem within IT security is awareness and understanding. Some think this is due to failing educational systems and will be solved by interdisciplinary courses and programmes.  ...  The original reason for me to start university courses in IT Security was exactly my interest in privacy in relation to computer systems, and the educational challenge of making aspects of IT Security  ... 
doi:10.1007/978-1-5041-2919-0_30 fatcat:yw5ohfohhrbrtmmmti65jrn7x4

A STUDY ON DIGITAL CITIZENSHIP: PRESCHOOL TEACHER CANDIDATES VS. COMPUTER EDUCATION AND INSTRUCTIONAL TECHNOLOGY TEACHER CANDIDATES

Filiz ELMALI, Ahmet TEKIN, Ebru POLAT
2020 The Turkish Online Journal of Distance Education  
The main goal of this study is to determine the digital citizenship perceptions and digital citizenship levels of preschool teacher candidates in terms of digital rights and responsibilities, digital security  ...  However, teacher candidates' misconceptions in terms of digital rights and responsibilities and digital security were observed.  ...  The literature contains studies on digital security awareness of individuals. In their study, Pusey and Sadera (2011) investigated digital security knowledge levels of prospective teachers.  ... 
doi:10.17718/tojde.803423 fatcat:ip5uy3xhofb3berldbqdur2leq

Information system security curricula development

Ed Crowley
2003 Proceeding of the 4th conference on Information technology education - CITC '03  
In this paper, we survey current literature concerning Information Systems Security Training and Education.  ...  This paper also describes current Information System Security Training and Education dynamics.  ...  Unlike more mature disciplines, such as Computer Science and Computer Engineering, there is neither a universally accepted Common Body of Information Systems Security Knowledge (CBK) nor a model curriculum  ... 
doi:10.1145/947121.947178 dblp:conf/sigite/Crowley03 fatcat:7swyetqu2rauxkv5ysvmafpw3a

Managing Cloud Computing Environment: Gaining Customer Trust with Security and Ethical Management

Issam Kouatli
2016 Procedia Computer Science  
These were: security, data protection and ethics in cloud computing environment.  ...  The sample size was 441 where it was resulted in highly significant relationship between ethics and security as well as ethics and data protection which are the main two motivations for any business to  ...  Conclusion In this paper, Trust relationship in cloud computing environment was investigated. Data Protection, security and ethics were the most significant variable in the conducted survey.  ... 
doi:10.1016/j.procs.2016.07.110 fatcat:p2oyhvksonehnbpduyz5zmcufq

ETHICAL PERSPECTIVES IN INFORMATION SECURITY EDUCATION

2006 Issues in Information Systems  
Suggestions are made to improve moral sensitivity and judgment through minimizing deindividualization, promoting moral argumentation using ethical scenarios, and establishing well defined ethical boundaries  ...  This paper relates the similarities between the deviations in moral behavior illustrated in the famous 1971 Zimbardo prison study with the behavior of deindividualized technologically savvy students in  ...  Logan and Clarkson [6] performed a survey of a graduate computer security class at Marshall University and found that no students had read the university's Acceptable Use Policy.  ... 
doi:10.48009/1_iis_2006_179-181 fatcat:o5zabhnoe5ccxj24wl2alqpkqy

Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses

Ashley Podhradsky, Larry J. LeBlanc, Michael i R. Bartolacc
2014 Journal of Cyber Security and Mobility  
The authors examine the need to provide basic information security and cyber ethics training for all university students, not just those pursuing an information security-related degree.  ...  The authors also discuss the need to include ethical hacking, as part of an emphasis on cyber ethics, into information security degree programs.  ...  in a university environment.  ... 
doi:10.13052/jcsm2245-1439.335 fatcat:mmvqkyji45hozomq5r5i27c7ui

Ethical Hacking in the Saudi Government Institutions

Shaymaa Mousa, Wejdan Barashi
2015 International journal for innovation education and research  
The results show that there is a lack of awareness to issues of information security, and ethical hacking, Ethical hacking have a positive impact on the Saudi institutions, and most of ethical hacking  ...  The main purpose of this study is to address the problems related to the ethical hacking in governmental institutions in Saudi Arabia.  ...  Lack of awareness among managers and staff of the issues of information security and ethical hacking and conduct of tests, therefore there is a great lack of awareness in society in general.  ... 
doi:10.31686/ijier.vol3.iss10.448 fatcat:nhfhvcjlnvelnkwpgvwds4iih4

Reflections on the Ethical Content of the IT Honours Program Project Module [chapter]

Lynette Drevin, Günther Drevin
2015 IFIP Advances in Information and Communication Technology  
The awareness that students have on ethical, social and legal issues is investigated in this paper.  ...  Not all projects have ethical, legal or social issues, however ethical aspects need to be reflected upon and awareness of these issues is essential during the planning of the project.  ...  This may indicate that the ethical concerns relating to people, the environment and the university is minimal.  ... 
doi:10.1007/978-3-319-18500-2_11 fatcat:piqafo5kljdhfkg2b5it4f2vo4

Ethical Decision Making with Information Systems Students

Samer Alhawari, Amine Nehari Talet
2011 International Journal of Cyber Ethics in Education  
This study investigates the ethical issues in education in terms of Information Systems students' attitudes at Saudi universities towards digital piracy.  ...  Organizations have invested in the development and implementation of security measures, but computer misuse continues to be a problem.  ... 
doi:10.4018/ijcee.2011040104 fatcat:vkotek6zn5ee3cwihso74ru4na

Learning Analytics in a Shared-Network Educational Environment: Ethical Issues and Countermeasures

Olugbenga Adejo, Thomas Connolly
2017 International Journal of Advanced Computer Science and Applications  
In the light of this, generalised strategies on ethical issues of the use of learners' data in an HEI shared networked environment are proposed.  ...  The results indicate that even though students have high trust in the privacy and security of their data being used by their institutions, more than half of the students have ethical concerns with the  ...  Learner"s awareness of the ethical issues relating to them should be enhanced through regular training or the use of game based IT ethics and security training. V.  ... 
doi:10.14569/ijacsa.2017.080404 fatcat:x7w3oxuyxbcnvkmg2biamgwove

Investigating electronic records management and compliance with regulatory requirements in a South African university

M.E. Kyobe, P. Molai, T. Salie
2009 South African Journal of Information Management  
This study investigated the extent to which academics and students at a leading University in South Africa managed electronic records in accordance with good practices and regulatory requirements.  ...  It was also surprising to find that non-computing academics and students managed system security risks better than their computing counterparts.  ...  Knowledge of IT security terminology This section determined the extent to which respondents understood some of the terminology used in a computing environment.  ... 
doi:10.4102/sajim.v11i1.396 fatcat:bg6g6ctfqfg6texzq6w6wmxkbq

Self-Awareness for Autonomous Systems

Nikil Dutt, Carlo S. Regazzoni, Bernhard Rinner, Xin Yao
2020 Proceedings of the IEEE  
environment, requiring sensing of environmental inputs, and self-aware strategies for actuation in the external physical environment.  ...  In 2010, he started his work on computational self-awareness, when he was a Co-Investigator (co-I) of an EU project on self-aware and self-expressive systems.  ... 
doi:10.1109/jproc.2020.2990784 fatcat:dyhiomtbgzd6daet5aqvudxrbq
« Previous Showing results 1 — 15 out of 70,656 results