scholarly journals TERMINOLOGY CONFUSION IN ENSURING CYBERSPACE SECURITY

Author(s):  
DAMJAN ŠTRUCL

Povzetek Terminologija je temeljna za razumevanje in obravnavanje neke tematike, še posebej, če ta tematika vpliva na reševanje varnostnih vprašanj v sodobnem varnostnem okolju, ki ni omejeno le na fizične meje in posamične države. Svet je s kibernetskim prostorom in informacijskim okoljem postal soodvisen ter medsebojno povezan s pomočjo informacijsko-komunikacijske tehnologije, zato so se pojavili novi termini, ki jih posamezniki, strokovna javnost, države in mednarodna skupnost razumejo drugače in se posledično tudi različno odzivajo, kar vpliva na varnost vseh sodelujočih. V prispevku želimo prikazati, da urejanje varnosti v kibernetskem prostoru brez enotne in strokovne terminologije ni dovolj, še posebej, če upoštevamo definicijo kibernetske varnosti. Ključne besede Terminologija, zaščita informacij, informacijska varnost, kibernetska varnost, kibernetska obramba. Abstract Terminology is fundamental to understanding and addressing a particular topic, especially if that topic has implications for addressing security issues in a modern security environment that is not limited to physical borders and individual countries. With the existence of cyberspace and information environment, the world has through the use of information and communication technology become interdependent and interconnected. As a result, new terms have emerged which are understood differently by individuals, the professional public, countries and the international community. Consequently, their responses differ, also affecting the security of all the involved entities. The aim of this article is to show that the regulation of security in cyberspace without uniform and professional terminology is not enough, especially if we consider the definition of cyber security. Key words Terminology, information assurance, information security, cyber security, cyber defence.

2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


2019 ◽  
Vol 292 ◽  
pp. 01036
Author(s):  
Pavel Valášek

Current condition of information and communication technology use by general public is suitable for a research of other information phenomena such as personal information environment. As a continuation of the broader study concerning this topic, in this article are discussed various methods of personal information environment assessment and evaluation. Data were collected by the means of survey and supervised tasks. Established differences between selected methods are presented. This study may be seen as suitable preparative study of this field.


Author(s):  
Cecilia Mari ◽  
Sara Genone ◽  
Luca Mari

This paper analyzes the reciprocal influences between various teaching methodologies supported by information and communication technology (ICT) and the teaching objectives that are pursued by means of these methodologies. The authors present the main characteristics of the conceptual model which has led to the definition of the teaching objectives and the results of the experience of the “eLearning@LIUC” project, where the validity of the hypotheses underlying the model has been tested through their application within concrete contexts. They believe that the presented model, with its analysis of the possible correlations between teaching objectives, teaching methodologies and technological tools, can provide a new awareness of the opportunities offered by the adoption of ICT in teaching.


2020 ◽  
Vol 10 (16) ◽  
pp. 5649 ◽  
Author(s):  
Bushra Canaan ◽  
Bruno Colicchio ◽  
Djaffar Ould Abdeslam

The importance of looking into microgrid security is getting more crucial due to the cyber vulnerabilities introduced by digitalization and the increasing dependency on information and communication technology (ICT) systems. Especially with a current academic unanimity on the incremental significance of the microgrid’s role in building the future smart grid, this article addresses the existing approaches attending to cyber-physical security in power systems from a microgrid-oriented perspective. First, we start with a brief descriptive review of the most commonly used terms in the latest relevant literature, followed by a comprehensive presentation of the recent efforts explored in a manner that helps the reader to choose the appropriate future research direction among several fields.


Author(s):  
Hajer Chalghoumi

En éducation, un nombre croissant d’élèves avec incapacités ont recours aux aides techniques. Parallèlement, une littérature récente mais de plus en plus abondante étudie ce concept. En dépit de cet intérêt grandissant tant au niveau de la recherche que de la pratique liée à ces technologies, plusieurs indices soulignent la difficulté de distinguer entre ce concept et celui de technologies de l’information et de la communication (TIC) notamment en éducation. Les aides techniques sont-elles un concept distinct ou une variante des TIC? Quelles sont les conséquences d’une telle confusion conceptuelle ? Comment peut-on différencier ces deux concepts ? L’objectif du présent article est d’apporter des éléments de réponse à ces questions. In education, an increasing number of students with disabilities make use of assistive technologies (AT). Meanwhile, a recent but growing literature studies this concept. Despite this interest both in research and practice related to these technologies, several clues point to the difficulty of distinguishing it from and the information and communication technology (ICT), particularly in education. Are AT a distinct concept or a variation of ICT? What are the consequences of such a confusion? How can we differentiate these two concepts? The purpose of this article is to provide some answers to these questions.


2018 ◽  
Vol 210 ◽  
pp. 04041
Author(s):  
Pavel Valášek

This article discusses a security in a background of the personal information environment. A role and importance of personal information environment and its security is on the rise due to the increasing inclusion of information and communication technology. In many cases, the focus of conducted studies is on the technological part of the problem. In this article, results of the user-oriented study are presented. The main aim was to establish how users perceive security applications. As a preliminary study, a method of survey was utilized. Gathered data were evaluated using common statistical methods. Results of the study are presented in a suitable form with a consideration of a large variety of answers between users. Results show areas of technology and user disagreements. These established differences will be used as a basis of the future research.


2018 ◽  
Vol 4 (1) ◽  
pp. 63-70 ◽  
Author(s):  
In In Supianti

UTILIZATION OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) IN MATHEMATICS LEARNING. The aims of this study are (1) to explain the definition of Information and Communication Technology (ICT); (2) to explain the importance of ICT used in Mathematics Learning; (3) to describe how much ICT used in Mathematics Learning in indoensia; (4) to elaborate the positive and negative effects of implementing ICT used in Mathematics learning. The methods used are literature review and description of interviews to educators and learners in the field of mathematics education. Information and Communication Technology is an electronic equipment consisting of hardware and software as well as any activities related to processing, manipulation, management, and transfer of information between media. It has has a function to produce quality and communicative information. In Indonesia, the use of Information and Communication Technology is still in integrating level, shown by the use of technology in learning. The utilization of information technology, in addition to efforts to overcome the technical problems of learning as a learning medium, as well as an effort to answer the substantial problem of learning as a source of teaching and encourage computer literacy acceleration in Indonesian society.


Author(s):  
R. G. G. Alam ◽  
H. Ibrahim

Abstract. The development of information and communication technology has spread throughout the world. Many benefits can be obtained, but the risks cannot be avoided. Communication grows massively in cyberspace and thus poses a security threat to smart city services. This threat can be overcome through national spectrum by implementing cyberspace security strategies in developing smart cities. This paper describes cybersecurity strategies performed in supporting the development of smart cities. Security strategies are developed based on factors related to the perspective of three pillars of smart city implementation models, namely technology, people, and institutions. Factors related to cybersecurity from these three pillars are explored from the experience of policy makers, actors, and users of smart city services, and evaluated using the opinions of cybersecurity experts and smart cities. This strategy will be a standard document that will be used as a reference in carrying out all processes related to information security in supporting the development of smart cities.


Sign in / Sign up

Export Citation Format

Share Document