168,493 research outputs found

    Fourteenth Biennial Status Report: März 2017 - February 2019

    No full text

    Кибербезопасность в образовательных сетях

    Get PDF
    The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем

    Conceptualizing human resilience in the face of the global epidemiology of cyber attacks

    Get PDF
    Computer security is a complex global phenomenon where different populations interact, and the infection of one person creates risk for another. Given the dynamics and scope of cyber campaigns, studies of local resilience without reference to global populations are inadequate. In this paper we describe a set of minimal requirements for implementing a global epidemiological infrastructure to understand and respond to large-scale computer security outbreaks. We enumerate the relevant dimensions, the applicable measurement tools, and define a systematic approach to evaluate cyber security resilience. From the experience in conceptualizing and designing a cross-national coordinated phishing resilience evaluation we describe the cultural, logistic, and regulatory challenges to this proposed public health approach to global computer assault resilience. We conclude that mechanisms for systematic evaluations of global attacks and the resilience against those attacks exist. Coordinated global science is needed to address organised global ecrime

    Identifying immersive environments’ most relevant research topics: an instrument to query researchers and practitioners

    Get PDF
    This paper provides an instrument for ascertaining researchers’ perspectives on the relative relevance of technological challenges facing immersive environments in view of their adoption in learning contexts, along three dimensions: access, content production, and deployment. It described its theoretical grounding and expert-review process, from a set of previously-identified challenges and expert feedback cycles. The paper details the motivation, setup, and methods employed, as well as the issues detected in the cycles and how they were addressed while developing the instrument. As a research instrument, it aims to be employed across diverse communities of research and practice, helping direct research efforts and hence contribute to wider use of immersive environments in learning, and possibly contribute towards the development of news and more adequate systems.The work presented herein has been partially funded under the European H2020 program H2020-ICT-2015, BEACONING project, grant agreement nr. 687676.info:eu-repo/semantics/publishedVersio

    Cyber Security Awareness Among College Students

    Get PDF
    This study reports the early results of a study aimed to investigate student awareness and attitudes toward cyber security and the resulting risks in the most advanced technology environment: the Silicon Valley in California, USA. The composition of students in Silicon Valley is very ethnically diverse. The objective was to see how much the students in such a tech-savvy environment are aware of cyber-attacks and how they protect themselves against them. The early statistical analysis suggested that college students, despite their belief that they are observed when using the Internet and that their data is not secure even on university systems, are not very aware of how to protect their data. Also, it appears that educational institutions do not have an active approach to improve awareness among college students to increase their knowledge on these issues and how to protect themselves from potential cyber-attacks, such as identity theft or ransomware

    Homo Virtualis: existence in Internet space

    Get PDF
    The study of a person existence in Internet space is certainly an actual task, since the Internet is not only a source of innovation, but also the cause of society's transformations and the social and cultural problems that arise in connection with this. Computer network is global. It is used by people of different professions, age, level and nature of education, living around the world and belonging to different cultures. It complicates the problem of developing common standards of behavior, a system of norms and rules that could be widely accepted by all users. On the other hand, the Internet space can be viewed as a new form of existence where physical laws do not work, and in connection with this, social ones are often questioned. This paper focuses on how social norms regulate relations in Internet space. The authors represents the typology of deviant behavior in the network. The empirical basis of the research includes the sociological survey of students of the senior courses in the Institute of Computer Science and Technology of Peter the Great St. Petersburg Polytechnic University. Sociological survey allows to identify students’ understanding of Internet space. The selection of students is conditioned by the fact that IT professionals are considered simultaneously as ordinary users of the network and as future professionals in this field

    The digital glass house - Social networking and privacy

    Get PDF
    Since the explosion of the Internet age, nearly 2 billion people are connected to the World Wide Web, creating seemingly limitless opportunities for communication and collaboration including social networking. Communication is virtually instantaneous and vast amounts of information are available at the touch of a key.In such an open digital environment, we take it for granted that almost any information can be sourced online by anyone with Internet access.The rapid growth of the social networking sites (SNS) such as Facebook, which reaches 500 million users recently, has coincided with an increasing concern over personal privacy.This study examines how Facebook users' perceptions of privacy, frequency of use, and the disclosure of their personal information with other users. This study was guided by two research questions: What are the Facebook users' perceptions of privacy and what is the personal information they disclose to other users? Does the Facebook users' frequency of use affect their disclosure of personal information? 149 respondents from the researcher's own Facebook profile filled up a Web-based questionnaire in August 2010. The data was analyzed using descriptive and inferential statistics.The research hypothesized that higher levels of privacy perception will result in less disclosure of personal information and the more active a user is on Facebook, the greater will be the user's likelihood of maintaining a private profile. The results of chi-square tests and correlation analysis found significant positive relationships between privacy perception and the disclosure of personal information, and no significant relationships between frequency of use and disclosure of personal information. Recommendations for future researchers were also included

    Teaching psychology to computing students

    Get PDF
    The aim of this paper is twofold. The first aim is to discuss some observations gained from teaching Psychology to Computing students, highlighting both the wide range of areas where Psychology is relevant to Computing education and the topics that are relevant at different stages of students’ education. The second aim is to consider findings from research investigating the characteristics of Computing and Psychology students. It is proposed that this information could be considered in the design and use of Psychology materials for Computing students. The format for the paper is as follows. Section one will illustrate the many links between the disciplines of Psychology & Computing; highlighting these links helps to answer the question that many Computing students ask, what can Psychology offer to Computing? Section two will then review some of the ways that I have been involved in teaching Psychology to Computing students, from A/AS level to undergraduate and postgraduate level. Section three will compare the profiles of Computing and Psychology students (e.g. on age, gender and motivation to study), to highlight how an understanding of these factors can be used to adapt Psychology teaching materials for Computing students. The conclusions which cover some practical suggestions are presented in section four

    Information technology and computer science programs: How do we relate?

    Get PDF
    In this panel session, the relationship between computer science programs and information technology programs at universities that house both will be explored. People outside the computing disciplines often find the distinction between these programs confusing. The panelists, who have experience with both types of program, will discuss strategies for differentiating the programs in the eyes of administrators, for advising students into the correct program, and for maintaining focus and excellence in both computer science and information technology programs
    corecore