Author(s):  
Radi Petrov Romansky ◽  
Irina Stancheva Noninska

The contemporary digital world based on network communications, globalization and information sharing outlines new important targets in the area of privacy and personal data protection which reflect to applied principles of secure access to proposed information structures. In this reason the aim of secure access to all resources of an e-learning environment is very important and adequate technological and organizational measures for authentication, authorization and protection of personal data must be applied. Strong security procedures should be proposed to protect user's profiles, designed after successful registration and all personal information collected by educational processes. The goal of this article is to present an idea to combine traditional e-learning technologies with new opportunities that give mobile applications, cloud services and social computing. These technologies can endanger data security since they make possible remote access to resources, sharing information between participants by network communications. In order to avoid data vulnerabilities users must be identified and authenticated before, i.e. to be allowed to access information resources otherwise integrity and confidentiality of e-learning system could be destroyed. In order to propose solution basic principles of information security and privacy protection in e-learning processes are discussed in this article. As a result, an organizational scheme of a system for information security and privacy is proposed. Based on these principles a graph formalization of access to the system resources is made and architecture for combined (heterogenic) e-learning architecture with secure access to the resources is designed. Analytical investigation based on designed Markov chain has been carried out and several statistical assessments delivered by Develve software are discussed.


2015 ◽  
Vol 4 (4) ◽  
pp. 47-58 ◽  
Author(s):  
Nico Martins ◽  
Adéle da Veiga

An information security culture is influenced by various factors, one being regulatory requirements. The United Kingdom (UK) has been regulated through the UK Data Protection Act since 1995, whereas South Africa (SA) only promulgated the Protection of Personal Information Act (PoPI) in 2013. Both laws stipulate requirements from an information security perspective with regard to the processing of personal information, however in the UK this has been regulated for a longer period. Consequently, it is to be expected that the information security culture for organisations in the UK will be significantly different from that of SA. This raises the question as to whether the same information security culture assessment (ISCA) instrument could be used in an organisation with offices in both jurisdictions, and whether it might be necessary to customise it according the particular country’s enforcement of information security and privacy-related conditions. This is reviewed, firstly from a theoretical perspective, and secondly a factorial invariance analysis was conducted in a multinational organisation with offices in both the UK and SA, using data from an ISCA questionnaire, to determine possible factorial invariances in terms of the ISCA.


Author(s):  
Oh Ky U-Cheol

The ICT revolution triggered by the emergence of smart devices, typically represented by the iPhone and the iPad, is migrating into the new domain of ‘big data’ after passing the turning point of ‘SNS Life,’ which is represented by Twitter and FaceBook among others. These developments have brought significant changes in all areas of politics, economy and culture. The stock prices of Apple, Samsung Electronics, FaceBook and Google fluctuate depending on who takes the hegemony in the changes. Meanwhile, such a reform of the ICT sector has generated some new undesirable sideeffects, including online disclosure of personal information, malicious comments, Smishing or other forms of financial scams. As we cannot abandon either big data or privacy protection, it is critical to find a compromise. It seems both evident and selfexplanatory that the use of big data, which is attributable to technical innovation, conflicts with privacy protection based on the idea that individuals should be allowed to determine the disclosure or not of their personal information. Yet, the problem here is that the discussion of countermeasures remains at the level of catching the wind with a net. Therefore, this paper intends to present a framework that can objectively verify what impact the enhanced legal regulation concerning privacy protection has on the use of big data as the first step in exploring a compromise between the use of big data and privacy protection.


2020 ◽  
Vol 218 ◽  
pp. 04008
Author(s):  
Yang Shen

In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.


Sign in / Sign up

Export Citation Format

Share Document