336,532 research outputs found

    TRANSFORMASI PENDIDIKAN: MENGHADAPI TANTANGAN GURU DI ERA SOCIETY 5.0

    Get PDF
    Education has been a foundational essence in human evolution. With the changing times, paradigm shifts, and technological advancements, the educational landscape undergoes metamorphosis. Presently, we stand at the threshold of the Society 5.0 Era, a time where technology not only transforms how we learn but also demands fundamental changes in the roles and involvement of teachers. Being a teacher in the Society 5.0 era presents various challenges, including shifts in roles and skills, technological disparities, curriculum changes, digital security, and alterations in assessment methods. The purpose of this research is to analyze how the preparation for enhancing the quality of teachers is crucial in facing the challenges of the learning system in the Society 5.0 era, as well as identifying the factors influencing teacher readiness in confronting the challenges of the learning system in the Society 5.0 era. This study employs a qualitative research approach, utilizing a literature review methodology. The researcher employs discourse analysis techniques to analyze the data

    YOU ARE THE WEAKEST LINK: ADDRESSING CYBER SECURITY CONCERNS WITHIN THE FIRE DEPARTMENT OF NEW YORK

    Get PDF
    The evolving cyber threat landscape consistently challenges organizational cybersecurity defenses. Cyberattacks, which were once rare, have become alarmingly frequent. In response, organizations have traditionally focused on technological solutions; however, human error remains a leading cause of network data breaches. The lack of effective security measures aimed at mitigating human error leaves organizations, such as the Fire Department of New York (FDNY), vulnerable to cyber intrusions. The FDNY’s dependence on digital networks for day-to-day operations underscores the need for security measures that address both technological and human vulnerabilities. This research combines descriptive, evaluative, and prescriptive methods, including a red-team exercise simulating a social engineering attack, to assess how the current cyber threat environment affects the FDNY. The study uncovers significant vulnerabilities, particularly among frontline personnel, who are often overlooked in traditional cybersecurity practices. Based on the findings, the research proposes strategic recommendations to strengthen the FDNY’s cyber defenses. The study promotes a comprehensive “all-hands-on-deck” approach that highlights the importance of making cybersecurity a shared responsibility, encompassing everyone from frontline personnel to senior leadership. This approach offers insights and methods applicable to other organizations seeking to strengthen their cybersecurity posture.Distribution Statement A. Approved for public release: Distribution is unlimited.Civilian, Fire Department of New Yor

    Human Security Informatics, Global Grand Challenges and Digital Curation

    Get PDF
    This paper argues that addressing humanitarian issues and concerns about social and societal inequities that are integral to many societal grand challenges needs to become a concerted and sustained focus of digital curation. It proposes a new framing emanating out of the archival and record-keeping community – Human Security Informatics (HSI) – for human and humanitarian-centered rather than data, artifact or research-centered digital curation research and development. Human security is proposed as a new concept that promotes the protection and advancement of individuals and communities. It prioritizes individual agency and rights, and human-centered and multidisciplinary approaches that support democratization, transparency and accountability in trans- and supra-national governance and policy-making. Within this ethos, HSI specifically targets data, documentary, record-keeping and other accountability and evidentiary components of societal grand challenges. In so doing it necessarily highlights curation grand challenges, and demands the reorientation of some fundamental assumptions of digital curation relating to technological, economic and policy infrastructure priorities and standards, trust, scale, universality and content-centricity. To illustrate its argument, two research endeavors are discussed. The first is an Archival Education and Research Initiative (AERI) study that analyzed six areas of societal grand challenges and identified key, and often overlooked, areas where HSI could and should contribute. The analysis also surfaced grand challenges facing the digital curation community itself, many with particular applicability to digital curation capacity, processes and priorities in bureaucratic archives. The second is the Refugee Rights in Records (R3) Project, an example of wide-ranging HSI research that is focused on data, social media content and record-keeping, as well as on individual human rights in and to records and documentation. In both examples the paper identifies several specific areas of relevance to digital curation where an HSI approach would be appropriate

    Blockchain-Enabled Federated Learning Approach for Vehicular Networks

    Full text link
    Data from interconnected vehicles may contain sensitive information such as location, driving behavior, personal identifiers, etc. Without adequate safeguards, sharing this data jeopardizes data privacy and system security. The current centralized data-sharing paradigm in these systems raises particular concerns about data privacy. Recognizing these challenges, the shift towards decentralized interactions in technology, as echoed by the principles of Industry 5.0, becomes paramount. This work is closely aligned with these principles, emphasizing decentralized, human-centric, and secure technological interactions in an interconnected vehicular ecosystem. To embody this, we propose a practical approach that merges two emerging technologies: Federated Learning (FL) and Blockchain. The integration of these technologies enables the creation of a decentralized vehicular network. In this setting, vehicles can learn from each other without compromising privacy while also ensuring data integrity and accountability. Initial experiments show that compared to conventional decentralized federated learning techniques, our proposed approach significantly enhances the performance and security of vehicular networks. The system's accuracy stands at 91.92\%. While this may appear to be low in comparison to state-of-the-art federated learning models, our work is noteworthy because, unlike others, it was achieved in a malicious vehicle setting. Despite the challenging environment, our method maintains high accuracy, making it a competent solution for preserving data privacy in vehicular networks.Comment: 7 page

    Dinamika Kebenaran Epistemik Keagamaan dalam Tantangan dan Pembaharuan Pada Era Penggunaan Kecerdasan Buatan

    Get PDF
    In a period of advanced data and communication innovations, artificial intelligence (AI) has become a fundamental part of various parts of human existence. The research aims to explore artificial intelligence's impact on contemporary human religious understanding, especially on epistemic truth. This research applies a qualitative methodology to detail and understand epistemic truth in the context of religion in the era of artificial intelligence. This approach provides space for complex and contextual insights into the impact of artificial intelligence on religious understanding. Exploring religious epistemic truth involves analysing epistemological theories such as coherence, correlation and pragmatism, which provide deep insights. The main criterion of coherence theory is internal consistency, correlation theory focuses on correspondence with spiritual reality, and pragmatic theory emphasises practical impact in religious practice. The era of utilising artificial intelligence brings significant ethical concerns and social impacts. Challenges, such as the risk of bias in religious interpretation by algorithms, the potential to replace the spiritual role of humans and ethical concerns regarding privacy and data security, are issues that need attention. Therefore, this article contributes to integrating theories of religious epistemology with the modern challenges that arise with the use of artificial intelligence in religious life. The holistic approach adopted by this article provides deep insights into the complexity of truth and ethical values in the technological era

    Identifying the Effect of Data Breach Publicity on Information Security Awareness using Hierarchical Regression

    Get PDF
    © 2021 IEEE. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/The technological evolution has formed new challenges for organizations to safeguard their information as digital assets. Information Security Awareness (ISA) is the cognitive state where individuals comprehend information security, threats, and the capability to develop preventive strategies. Prior studies discovered that human mistakes or misbehavior is the most vulnerable link in information security due to insufficient security awareness. There were massive data breaches reported throughout the years globally. Literature shows that individuals will develop their evaluations of risks and sense of security awareness when receiving security risk information such as data breach incidents. These indications motivated us to examine the effect of an unexplored factor, that is, data breach publicity (DBR) on ISA. The purpose of this research is to discover if DBR significantly improves a model's ability to predict ISA and its magnitude in influencing ISA. A 3-stage hierarchical linear regression approach was used to build up the model with prior known influential factors to predict ISA. To the extent of our knowledge, there is no study reported to date regarding the implication of DBR on ISA. Our main findings reveal that DBR significantly explains 6.7% of ISA and achieves the highest coefficient comparing with prior known factors. Our research contributes to a novel discovery of a new factor that significantly influences ISA and its magnitude in increasing ISA. This discovery implies the need to incorporate the knowledge of data breach incidents into ISA-related educative programs or strategies to increase ISA.Peer reviewe

    The Security Challenge of Disruptive Technologies

    Get PDF
    Dynamic changes that characterize the modern security environment have been significantly driven and shaped by the rapid pace of technological development. Of particular importance is the emergence and development of technologies that revolutionary change the character of the security environment - disruptive technologies. The paper analyzes disruptive technologies aimed at the automation, acceleration and autonomy of the data processing process, decision-making abilities, and actions independent of human factor. These technologies affect all spheres of social life and subsequently security. Unlike previous disruptive technologies that influence security driven by the states and their defense sectors, the recent technologies are predominantly developing in private sector. This fact leads the countries to dependency on the private sector, and face them with significant challenges in identifying threats, its content and possible responses. Technologically less developed countries are particularly vulnerable. Based on the hypothesis of how disruptive technologies influence the design of security environments, an analysis of strategic security documents of Croatia, the USA, Russia, China, NATO, EU, and the states from the Croatian neighborhood has been conducted to determine if these countries recognize disruptive technologies as a security threat and how they approach them. The research has shown that Croatia does not recognize disruptive technologies as a specific threat. The analysis also indicates that, in the case of technologically less developed countries, such as the case of Croatia, security communities such as the EU or NATO provide a platform for responding to those threats.</p

    The Security Challenge of Disruptive Technologies

    Get PDF
    Dynamic changes that characterize the modern security environment have been significantly driven and shaped by the rapid pace of technological development. Of particular importance is the emergence and development of technologies that revolutionary change the character of the security environment - disruptive technologies. The paper analyzes disruptive technologies aimed at the automation, acceleration and autonomy of the data processing process, decision-making abilities, and actions independent of human factor. These technologies affect all spheres of social life and subsequently security. Unlike previous disruptive technologies that influence security driven by the states and their defense sectors, the recent technologies are predominantly developing in private sector. This fact leads the countries to dependency on the private sector, and face them with significant challenges in identifying threats, its content and possible responses. Technologically less developed countries are particularly vulnerable. Based on the hypothesis of how disruptive technologies influence the design of security environments, an analysis of strategic security documents of Croatia, the USA, Russia, China, NATO, EU, and the states from the Croatian neighborhood has been conducted to determine if these countries recognize disruptive technologies as a security threat and how they approach them. The research has shown that Croatia does not recognize disruptive technologies as a specific threat. The analysis also indicates that, in the case of technologically less developed countries, such as the case of Croatia, security communities such as the EU or NATO provide a platform for responding to those threats.</p

    Securing intellectual capital:an exploratory study in Australian universities

    Get PDF
    Purpose – To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.Design/methodology/approach – We gathered insights from existing IC-related research publications to delineate key foundational aspects of IC, identify and propose links to traditional information security that impact the protection of IC. We conducted interviews with key stakeholders in Australian universities in order to validate these links.Findings – Our investigation revealed two kinds of embeddedness characterizing the organizational fabric of universities: (1) vertical and (2) horizontal, with an emphasis on the connection between these and IC-related knowledge protection within these institutions.Research implications – There is a need to acknowledge the different roles played by actors within the university, and the relevance of information security to IC-related preservation.Practical implications – Framing information security as an IC-related issue can help IT security managers communicate the need for knowledge security with executives in higher education, and secure funding to preserve and secure such IC-related knowledge, once its value is recognized.Originality/value – This is one of the first studies to explore the connections between data and information security and the three core components of IC’s knowledge security in the university context
    • …
    corecore