Towards a Design Theory for Educational On-line Information Security Laboratories

Author(s):  
Sarfraz Iqbal ◽  
Tero Päivärinta
2017 ◽  
Vol 4 (2) ◽  
pp. 1-7
Author(s):  
Penny Hart

This article contends that there are two increasingly important phenomena for organisations: the existence of virtual teams and the realisation that information needs to be protected more effectively. On-line communication methods expose organisations to issues regarding security of their ICT infrastructure, systems and data. At the same time, making possible virtual teams able to be unconstrained in purpose, time or location. While security measures are built into the teams' communication channels and processes, the perceptions, practices and organizational background of team members are equally important to the security of information being exchanged. A socio-technical approach is called for when investigating different perceptions of information security by individual team members, how they negotiate a common understanding for the team and what complexities and practices are introduced in multi-organisation teams. The article sets out issues which may need to be considered and proposes a course of research to increase understanding of the situation.


2011 ◽  
Vol 9 (4) ◽  
pp. 41-56 ◽  
Author(s):  
Ruey-Shiang Shaw ◽  
Huan-Chao Keh ◽  
Nan-Ching Huang

Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception building. Therefore, the authors have tried to figure out if the implementation of knowledge maps on the training materials of Information Security Awareness will improve the learning performance. Based on the e-learning materials for E-Mail Information Security Awareness, the authors designed them in the format of knowledge maps and compared the learning performance with common browsing-based materials. The results showed the knowledge map-based materials lead to higher learning performance than browse-based ones.


Leonardo ◽  
1999 ◽  
Vol 32 (4) ◽  
pp. 281-291 ◽  
Author(s):  
Susan E. Metros

The overuse of visual imagery and the redundancy of information in traditional and new communication media have desensitized our society, resulting in an emotional bankruptcy. The World Wide Web communication medium, with its highly visual interface and virtual environments, perpetuates and aggravates this situation. The “new designers” of the twenty-first century must partner with technology experts, content specialists and common users to reinvigorate imagination and rekindle emotions. To this end, we can identify and extract the six essential ingredients of engagement from the traditional performing arts, communication and design theory and recast them to support new media that are both visually stimulating and emotionally provocative.


Author(s):  
Roy D. Johnson ◽  
Carl H. Stucke

The use of the Internet offers a unique opportunity to bring together individuals in an interactive setting for social and educational purposes. Colleges and universities have augmented their brick and mortar classes with virtual course offerings using the Internet for distance education. This paper will examine the origins of distance education and offer insights and recommendations for developing and delivering an on-line MBA course in Privacy and Information Security.


2021 ◽  
Vol 10 (2) ◽  
pp. 16-20
Author(s):  
Fabio DI FRANCO ◽  
Konstantinos PAPADATOS ◽  
Konstantinos RANTOS

Cyber security training, as many other aspects in our lives, has been adapted to address concerns related to travel restrictions and group gatherings resulting from the COVID-19 pandemic. In this context, ENISA, the European Union Agency for Cybersecurity, had to re-visit and significantly modify its already established course on Information Security Management and ICT security, which is provided under the auspices of the European Security and Defence College (ESDC). The program provides public employees the opportunity to gain the necessary knowledge and skills to assume an Information Security Management role. The restructured course was introduced to address the COVID-19 restrictions and has proven to be equally effective to the classroom-delivered course, if not more effective at some parts. This paper presents the main structure of the fully online training, its innovative elements, and the assessment results which prove that COVID-19 pandemic has triggered the introduction of innovative and successful on-line training scenarios.


2021 ◽  
Vol 27 (2) ◽  
pp. 72-77
Author(s):  
M. E. Sukhoparov ◽  
◽  
I. S. Lebedev ◽  
K. I. Salakhutdinova ◽  
◽  
...  

An approach to analyzing the state of information security of industrial Internet devices and the Internet of things is described. External control systems that use side channels and allow to avoiding the consumption of computing resources of functioning devices are used. The proposed solution allows one to monitor the state of the device on-line with minimal costs for using computing resources during operation.


Author(s):  
William Krakow

In the past few years on-line digital television frame store devices coupled to computers have been employed to attempt to measure the microscope parameters of defocus and astigmatism. The ultimate goal of such tasks is to fully adjust the operating parameters of the microscope and obtain an optimum image for viewing in terms of its information content. The initial approach to this problem, for high resolution TEM imaging, was to obtain the power spectrum from the Fourier transform of an image, find the contrast transfer function oscillation maxima, and subsequently correct the image. This technique requires a fast computer, a direct memory access device and even an array processor to accomplish these tasks on limited size arrays in a few seconds per image. It is not clear that the power spectrum could be used for more than defocus correction since the correction of astigmatism is a formidable problem of pattern recognition.


Author(s):  
A.M.H. Schepman ◽  
J.A.P. van der Voort ◽  
J.E. Mellema

A Scanning Transmission Electron Microscope (STEM) was coupled to a small computer. The system (see Fig. 1) has been built using a Philips EM400, equipped with a scanning attachment and a DEC PDP11/34 computer with 34K memory. The gun (Fig. 2) consists of a continuously renewed tip of radius 0.2 to 0.4 μm of a tungsten wire heated just below its melting point by a focussed laser beam (1). On-line operation procedures were developped aiming at the reduction of the amount of radiation of the specimen area of interest, while selecting the various imaging parameters and upon registration of the information content. Whereas the theoretical limiting spot size is 0.75 nm (2), routine resolution checks showed minimum distances in the order 1.2 to 1.5 nm between corresponding intensity maxima in successive scans. This value is sufficient for structural studies of regular biological material to test the performance of STEM over high resolution CTEM.


Sign in / Sign up

Export Citation Format

Share Document