scholarly journals The Use of the Evaluation Method of Software System Architecture to Assess the Impacts on Information Security in Information and Communication Technology Systems / WYKORZYSTANIE METODY OCENY ARCHITEKTURY SYSTEMU INFORMATYCZNEGO DO OCENY SKUTKÓW INCYDENTÓW NA BEZPIECZEŃSTWO INFORMACJI W SYSTEMACH TELEINFORMATYCZNYCH

2012 ◽  
Vol 24 (1) ◽  
pp. 59-70
Author(s):  
Ireneusz J. Jóźwiak ◽  
Artur Szleszyński

Abstract In a paper an application of the architecture evaluation method used for prediction the effects of incidents for information security which is inside of Information and Communication Technology (ICT) system is described. As a base, the ATAM method is taken. During the analysis there is shown, that direct use of the ATAM technique is impossible, because it use only one set of data. Use just one view of ICT system is not adequate for measure the influence of incident on information security, which is inside ICT system. A tool which is useful for assessment effects of incidents, is an incidence matrix that presents logical connections between elements of ICT system. Knowledge of logical connections and structures of the messages being exchanged enables an assessment of operation the elements which receive modified messages.

Author(s):  
Irawan Afrianto ◽  
Sufa Atin ◽  
Andri Heryandi ◽  
Lia Warlina

Journal as a medium to explain the results of research. It has developed in such a way especially because of the rapid support of information and communication technology today. Various models of online-based journaling management can be easily operated by journals managers as well as writers / researchers who will include research results in the journal. It's just that with the number of journals that exist today, causing difficulties for the manager of journals to be able to promote the journals he managed, in addition to the manager of the journal sometimes difficult to get a researcher who would put his paper into the journal he manages. Meanwhile, with the number of journals that have been online, researchers will find it difficult to get information from the journals. Researchers should open their journal entries, read their profiles and publications, until they are interested to include papers in the journal. This problem is the background of the development of online journals aggregator system, which with this system will facilitate the meeting between journals, journal managers and writers or researchers. In order to develop an online journal aggregator system, a software development method is needed that directly captures the needs of its users. This study aims to implement the UCD method in the functional design and interface of the aggregator journal system. In order to determine the level of acceptance and support of prospective users of the aggregator journal system. Measurements were taken using Likert method with user acceptance preferences for 3 aspects of the system, namely: accessibility, navigation, and content aspects. The measurement results show 82% of prospective users state that the functional design and interface of the aggregator journal system can be accepted and can be developed to the next stage.


Author(s):  
S. M. Wu ◽  
Y. C. Wu

Abstract. Cloud computing is an important part of the development of smart cities and also the focus of the information and communication technology (ICT) industry. From the concept of cloud computing, people and objects in cities are organized based on their application needs and computed in real time. It is a comprehensive utilization of the new generation of information and communication technology. This paper first introduces the concept of cloud computing, smart city construction in Taiwan, and the information security management standard of cloud computing, then describes the cloud computing security framework from three areas,and summarizes the implementation status of cloud computing in Taiwan, government policies, and measures, reaching the conclusion that information transmission must be fast and reliable and ensure personal privacy and security. Any type of information security problem will bring catastrophic consequences. Therefore, cloud computing also brings severe challenges to the traditional information security system.


2007 ◽  
Vol 15 (VIII) ◽  
pp. 91-98
Author(s):  
Murti Kusuma Wirasti

As global social, economic and politic competition grows sharper, education becomes an important source of competitive advantage. Information and Communication Technology (ICT) is one of the main part for learning process improvement in Indonesia. Getting the best from ICT depends on several variables, including the appropriate design of hard technology, soft technology, and content; the training and attitude of instructors; and the realization that different students have different requirements. But we must respond critically and wisely. ICT is produced by some countries with several goals to get advantages from developing countries which have placed ICT as an important factor for human welfare improvement, closely linking with educational system. A decision made to use ICT in learning system must consider several factors consciously, such as socio-cultural and economic capabilities of our society. That is an approach to maintain our goals as free as developed countries in using ICT for education.


Author(s):  
Ogochukwu Thaddaeus Emiri ◽  
Chukwunweike Gracious Omede

This chapter examines the problems of e-governance data/information security. In order to adequately achieve this objective, the chapter after the introduction, deals with the information and communication technology (ICT) security network, followed by effects of the changing nature of security threats in e-governance. The use of ICT internet security balancing requirements for achieving effective e-governance security network is considered. The chapter observes that strong security for internet transactions (information communication) is one of the last technical hurdles to be overcome in achieving true e-governance, enabling the broadest range of online government services while streamlining bureaucracy and providing efficient alternatives to in-person contact between government agencies and their constituents. The chapter argues that the problems of information security threats, if not tackled effectively, can hinder e-governance implementation success. The use of ICT internet security balancing requirements for achieving effective e-governance security network is recommended.


2019 ◽  
Vol 5 (2) ◽  
pp. 97
Author(s):  
Pangky Februari ◽  
Fitria Fitria

The implementation of information and communication technology management has become a necessary in every educational institution, especially in SMKN 1 Pugung, Lampung. Hence, in this research is tried to measure the information security standard in SMKN 1 Pugung using ISO 27001. The method used is audit operational which relates with economical and efficiency used of resource as well as the target aimed. Afterwards, the result shows that the analysis of quisionnaire has obtained averages value amounts 3,32 in a whole ISO 27001. It means that information security standard has performed well and written operational procedure standard. Then, the evaluation result which varies from 11 clause I categorized into level 4 (manage and measurable). It means that business process has well-monitored and measured. So therefore, it can be concluded that system audit of security information in SMKN 1 Pugung has been confirmed as good enough.


Author(s):  
Elena Mădălina Dedu ◽  
Alecxandrina Deaconu ◽  
Lavinia Rașcă

Abstract This research aims to highlight the efficacy of the use of Information and Communication Technology as a didactic teaching, learning and evaluation method for improving the instructionaleducational process within the tourism high school. Our research, which took place in 12 high schools with classes in Tourism and Nutrition in the County of Constanta between 2013 and 2016, was based on two variables: the independent variable - represented by the continuous, systematic use of ICT methods in teaching and learning content at the disciplines included in the curriculum Tourism and Nutrition at different levels of study and the dependent variable - which depends and changes according to the independent variable: the specific skills, the degree of understanding and assimilation of the specialized contents. In this article we will present the experimental phase in which the actual research was carried out on two parallel groups of subjects: an experimental group (where ICT methods were used - the coordinating teachers created virtual classes on the educational platform www.easyclass.com) and a control group (in which classical didactic methods were used) and the postexperimental phase in which tests of knowledge assessment were applied to both the experimental classes and the control classes. The post-experimental step allowed the measurement of the dependent variable in the two samples of subjects, experimental and control, and the comparison of the initial data with the final ones. For this purpose, tests for assessing the knowledge acquired by the pupils in the experimental and control classes as a result of each unit of learning included in the content sample were applied. These tests were created depending on the specific and derived competences of each unit of learning, following the extent of their development at the pupils in the two samples.


2018 ◽  
Vol 7 (3.8) ◽  
pp. 74
Author(s):  
Mr A.R.Gadekar ◽  
Dr M.V.Sarode ◽  
Dr V.M.Thakare

As there has been a vast advancement in information and communication technology, there is a need for change in traditional examination system. Traditional examination system is to be replaced by online examination system. A cloud based solution is proposed to tackle the various issues in educational institutions. Here, we propose architecture for an android based examination system using cloud computing concept. In this we attempt to show an applicability, usage of cloud storage in examination management in education. Android is used to simplify the tasks. The thumb verification device is used to authenticate the user. Some encryption techniques are used for providing security to data.  


2021 ◽  
Vol 19 (1) ◽  
pp. 70-94
Author(s):  
Ivo Juurvee ◽  
Uku Arold

Disruptive developments in the field of information and communication technology have enabled malicious actors to turn elements of the digital ecosystem into information weapons in hybrid conflict.  Estonia has tackled the new security realm with comprehensive national defence that is built upon understanding that the society itself is object of security and should provide appropriate safeguards and responses. Estonian conceptualisations of national cybersecurity, cyber psychological defence, strategic communications are elaborated in the light of actual seminal threat situations. Analysis of evolvement of the strategic documents guides the recommendations for even deeper blend of the technical cybersecurity culture with value-centric psychological defence and internationalisation of information security situational awareness and planning.


Sign in / Sign up

Export Citation Format

Share Document