409 research outputs found

    Cybersecurity program for Philippine higher education institutions: A multiple-case study

    Get PDF
    Digital technology has become an integral aspect of an educational system. Every state university funded the creation of Information Technology Offices to secure its Management Information System. The challenge on cybersecurity threatens the intellectual capital of students especially in a research university, theft of crucial information, and financial loss. The current study is a multiple case study of cybersecurity threats and challenges of Selected Philippine State Universities and Colleges in the National Capital Region. Sample participants were purposively selected Information Technology experts from various selected State College and Universities. A structured interview as the main instrument of the study investigated threats and challenges of cybersecurity to assess active and proactive approaches to developing a model framework for security resources in respective academic institutions. Responses gathered from the interview were consolidated and analyzed through a thematic coding process. The result of the study revealed the following challenges in cybersecurity are user education, cloud security, information security strategy, and unsecured personal devices. The creation of a program logic model will provide an informed cybersecurity planning, implementation, and assessment framework to the commission on higher education in collaboration with the Department of Information and Communication Technology, and the Philippine Association of the State Colleges and Universities

    Some Cyber Security Topics: Review Study

    Get PDF
    Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber-attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Cloud computing has emerged from the legacy data centres. Consequently, threats applicable in legacy system are equally applicable to cloud computing along with emerging new threats that plague only the cloud systems. Traditionally the data centres were hosted on-premises. Hence, control over the data was comparatively easier than handling a cloud system which is borderless and ubiquitous. Threats due to multi-tenancy, access from anywhere, control of cloud, etc. are some examples of why cloud security becomes important. Considering the significance of cloud security, this work is an attempt to understand the existing cloud service and deployment models, and the major threat factors to cloud security that may be critical in cloud environment

    A Design Case: Assessing the Functional Needs for a Multi-faceted Cybersecurity Learning Space

    Get PDF
    Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the structure and scope of the current cybersecurity program being supported and then draws out the functional requirements that were identified for the center based on the needs of the institution’s cybersecurity program. It also highlights the physical and logical design specifications of the center, as well as, the many external program delivery requirements that were identified as essential to not only the current cybersecurity program but also the projected future needs of the program and its supporting activities

    IOT Forensics Curriculum: Is It a Myth or Reality?

    Get PDF
    In this research paper, two questions are answered. The first question is Should universities invest in the preparation of an IoT forensics curriculum? . The second question is If the IoT forensics curriculum is worth investing in, what are the basic building steps in the development of an loT forensics curriculum? . To answer those questions, the authors conducted a comprehensive literature review spanning academia, the private sector, and non-profit organizations. The authors also performed semi-structured interviews with two experts from academia and the private sector. The results showed that because of the proliferation of IoT technology and the increasing number of attacks against loT devices, developing loT forensics curriculum should be considered by the universities. It is worth mentioning that loT forensics can be one of the main driving factors for securing IoT devices. However, because of the peculiarity and novelty of the domain, and the challenges of IoT forensics, it is difficult to prepare a course-centric curriculum at the very first step. Rather than doing this, universities can collaborate with various stakeholders from the private sector and government agencies to spot and study in real-world cases and let these cases build and evolve an IoT forensics curriculum

    Shifting Paradigms: Innovations in Teaching History in the Fourth Industrial Revolution

    Get PDF
    In the context of the Fourth Industrial Revolution, characterized by rapid technological advancements and widespread digitization, this paper delves into the evolving paradigms of historical education. Traditional teaching methods are becoming obsolete, given the tech-savvy nature of current learners. This study explores innovative pedagogical approaches that integrate technology, catering to the unique needs of this generation. By reviewing contemporary literature and gathering expert insights, we offer an overview of emerging trends in historical education. Notably, technology is poised to redefine how history is learned. Modern learners gravitate towards boundary-less learning experiences, enabled by resources like ebooks, ICT-based apps, websites, android platforms, VR, and virtual tours. To stay relevant, a significant shift in historical education is imperative. This paper concludes by emphasizing the profound implications of this transition and proposes actionable recommendations for educators and policymakers

    ResearchER Spring 2017

    Get PDF
    https://commons.erau.edu/researcher-magazine/1000/thumbnail.jp

    How 5G wireless (and concomitant technologies) will revolutionize healthcare?

    Get PDF
    The need to have equitable access to quality healthcare is enshrined in the United Nations (UN) Sustainable Development Goals (SDGs), which defines the developmental agenda of the UN for the next 15 years. In particular, the third SDG focuses on the need to “ensure healthy lives and promote well-being for all at all ages”. In this paper, we build the case that 5G wireless technology, along with concomitant emerging technologies (such as IoT, big data, artificial intelligence and machine learning), will transform global healthcare systems in the near future. Our optimism around 5G-enabled healthcare stems from a confluence of significant technical pushes that are already at play: apart from the availability of high-throughput low-latency wireless connectivity, other significant factors include the democratization of computing through cloud computing; the democratization of Artificial Intelligence (AI) and cognitive computing (e.g., IBM Watson); and the commoditization of data through crowdsourcing and digital exhaust. These technologies together can finally crack a dysfunctional healthcare system that has largely been impervious to technological innovations. We highlight the persistent deficiencies of the current healthcare system and then demonstrate how the 5G-enabled healthcare revolution can fix these deficiencies. We also highlight open technical research challenges, and potential pitfalls, that may hinder the development of such a 5G-enabled health revolution

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    The Evolution of 5G: Delineating the Impact and Limitations across Transportation, Education, Healthcare, Agriculture, and Manufacturing

    Get PDF
    A world previously only thought possible in science fiction is about to become a reality. A world where doctors can operate on patients thousands of miles away. A world where students can experience ancient cities and distant galalike they are physically there. A world of fully self-driving cars. A world where every step of the supply chain is automated. A world where factories have a handful of employees overseeing robots handling the entire manufacturing process. A world of fully autonomous farms, where one farmer can manage an entire farm from seed to harvest from their smartphone. The development, implementation, and adoption of 5G cellular networks will make this world a possibility. 5G is the fifth generation of cellular networks. It is the successor of the current fourth generation (4G) networks. 5G technology is characterized by ultra-low latency, massive data rates, near perfect reliability, extreme density of connection, and wide coverage areas. 5G is not just another “G”, it has the potential to completely disrupt the way we work and live (Binney, 2020). 5G networks will impact the world in an almost infinite number of ways. Business models will change, the way people work will change, the way students learn will change, the way patients get health care will change, the way people get their food will change, the way people drive will change. In this thesis, I examine the development, applications, benefits, and socioeconomic impacts of 5G technology, as well as current limitations facing the industry and ways to address them
    • …
    corecore