security education
Recently Published Documents


TOTAL DOCUMENTS

456
(FIVE YEARS 137)

H-INDEX

12
(FIVE YEARS 3)

2022 ◽  
Vol 2 (2) ◽  
pp. 94-103
Author(s):  
Ratna Susanti ◽  
Suci Purwandari

The objectives of this community service are: 1. assisting women farmer groups in the use of yard land, 2. educating women farmer groups in efforts to food security during the pandemic. This community service was carried out for 3 months, namely April, May, and June 2021 through the following methods: 1) lectures by the implementation team for the Women Farmer Group in Baran village, Cawas, Klaten who attended a total of 52 people regarding food security education in during the pandemic, 2) distribution of assistance for a number of vegetable seeds to be planted in a predetermined yard, 3) assistance in planting and using vegetables as a source of family nutrition. The result of this community service is that the women in Baran Village, Cawas, Klaten who are members of the Women Farmers Group have an independent business in the form of vegetable plants as a source of nutrition that can be used as a share of crop yields: from, by, for the Woman Farmer Group members.


2022 ◽  
pp. 258-275
Author(s):  
Dhaya R. ◽  
Kanthavel R.

Future IoT innovation patterns will assist offices with getting the greatest proficiency and efficiency out of their hardware and assembling parts. IoT is an essential element of digital transformation enterprises in business and industrial sections. Service suppliers and utilities have also been taking on IoT to get pioneering services to keep competitive. Services with security, power management, asset presentation, healthcare effectiveness, and threat and agreement management must be resolved properly in order to enhance the IoT effectively and efficiently. As new tech turns up, hackers prepare to capture the benefits of its potential flaws, and this is precisely why enhancing the precautions of associated strategy is the top IoT technology development. Objectives of this chapter are to analyze and access the future of IoT in healthcare, security, education, and agriculture. This chapter will focus on edge computing, a hybrid approach to process the data that allows connected devices to distribute, compute, examine, and maintain data locally.


2022 ◽  
pp. 535-546
Author(s):  
David A Gould ◽  
Gregory Block ◽  
Simon Cleveland

Evolution is a well-established biological theory, but some basic concepts can be abstracted and applied to non-biological domains such as the education domain for the purposes of knowledge sharing. There is a gap in the literature regarding how evolutionary processes can be applied to cyber security education. This article presents the general evolutionary algorithm and pairs it with an ideation technique (SCAMPER) to illustrate how certain evolutionary processes can be applied to cyber security education and learning. This paper does not attempt to close the gap, but rather offer a theoretical approach to address the gap.


2022 ◽  
pp. 1-30
Author(s):  
Viacheslav Izosimov ◽  
Martin Törngren

Our societal infrastructure is transforming into a connected cyber-physical system of systems, providing numerous opportunities and new capabilities, yet also posing new and reinforced risks that require explicit consideration. This chapter addresses risks specifically related to cyber-security. One contributing factor, often neglected, is the level of security education of the users. Another factor, often overlooked, concerns security-awareness of the engineers developing cyber-physical systems. Authors present results of interviews with developers and surveys showing that increase in security-awareness and understanding of security risks, evaluated as low, are the first steps to mitigate the risks. Authors also conducted practical evaluation investigating system connectivity and vulnerabilities in complex multi-step attack scenarios. This chapter advocates that security awareness of users and developers is the foundation to deployment of interconnected system of systems, and provides recommendations for steps forward highlighting the roles of people, organizations and authorities.


2022 ◽  
pp. 50-72
Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


2022 ◽  
pp. 213-232
Author(s):  
Kwame Simpe Ofori ◽  
Hod Anyigba ◽  
George Oppong Appiagyei Ampong ◽  
Osaretin Kayode Omoregie ◽  
Makafui Nyamadi ◽  
...  

One of the major concerns of organizations in today's networked world is to unravel how employees comply with information security policies (ISPs) since the internal employee has been identified as the weakest link in security policy breaches. A number of studies have examined ISP compliance from the perspective of deterrence; however, there have been mixed results. The study seeks to examine information security compliance from the perspective of the general deterrence theory (GDT) and information security climate (ISC). Data was collected from 329 employees drawn from the five top-performing banks in Ghana and analyzed with PLS-SEM. Results from the study show that security education training and awareness, top-management's commitment for information security, and peer non-compliance behavior affect the information security climate in an organization. Information security climate, punishment severity, and certainty of deterrent were also found to influence employees' intention to comply with ISP. The implications, limitations, and directions for future research are discussed.


2022 ◽  
pp. 568-587
Author(s):  
Janos Csala ◽  
Jennifer Wanjiku Mwangi

Water security is a central sustainable development challenge. Billions of people lack access to clean and reliable water, while global hydrological changes and increasingly common extreme weather events pose serious risks. However, current issues are mainly driven by unsustainable management and ensuing ecological degradation. Nature-based solutions restore, enhance and safeguard ecosystems that provide water for people and the rest of nature. They also buffer the impacts of natural hazards and provide other critical benefits. Global policy frameworks on sustainable development, disaster prevention, climate change, biodiversity, wetlands and desertification offer holistic objectives toward water security. Education and capacity development is one of their central connective tissues, and as a mean to enhance their implementation. In spite of this, major gaps remain that require novel approaches. This chapter explores these and discusses strategic considerations and innovative approaches that can leverage existing knowledge and foster context specific innovation for transformative solutions.


2021 ◽  
Author(s):  
Mallappa G. Mendagudli ◽  
K.G. Kharade ◽  
T. Nadana Ravishankar ◽  
K. Vengatesan

Effective methods for video indexing will be more valuable as digital video data continues to grow. It has been years since we’ve seen this level of new multimedia research. The content analysis aims to create high-level descriptions and annotations by treating language and facts as data. Data mining is a technique that seeks out previously unknown facts and patterns in large datasets. A video can include several different kinds of data, such as images, visuals, audio, text, and additional metadata. Thanks to its broad application in various disciplines, like security, education, medicine, research, sports, and entertainment, it is often used differently. Data mining aims to discover and articulate exciting patterns that are hidden in a lot of video footage. While video mining is still in its infancy, data mining is more mature. A considerable amount of research must be done to turn the mined video into usable content


ITNOW ◽  
2021 ◽  
Vol 63 (4) ◽  
pp. 44-45
Author(s):  
Oscar O'Connor

Abstract To protect the most vulnerable, security education and awareness campaigns need also to target leaders, managers, architects, operators, administrators and developers. Oscar O’Connor FBCS presents his views and recommendations.


Author(s):  
Ahmad Haziq Ashrofie Hanafi ◽  
Haikal Rokman ◽  
Ahmad Dahaqin Ibrahim ◽  
Zul-Azri Ibrahim ◽  
Md Nabil Ahmad Zawawi ◽  
...  

Cybersecurity education topics require technical understanding. However, it is a challenging task for any teacher to introduce topics to students who have no technical background. Recently, the concept of gamification has been implemented as a tool to inculcate student’s interest using a variety of popular in-games techniques and applying them to educational modules. Extending from this notion, it was found that Capture the Flag (CTF) competition style is a successful way of introducing students to various technical concepts in the standard computer science curriculum. During the 2019 school holiday, a CTF for secondary school students was run at Universiti Tenaga Nasional (UNITEN) with the primary goal of introducing secondary school students to various cybersecurity topics and also to inculcate their interest in cybersecurity. The method that we used is different from other CTF or similar events, in which we use a scenario-based approach. We found that this method attracts participants in solving each challenge in a competitive environment.


Sign in / Sign up

Export Citation Format

Share Document