Cyber security in a digital learning environment

- Биков, В.Ю. (orcid.org/0000-0002-5890-6783), Буров, О.Ю. (orcid.org/0000-0003-0733-1120) and Дементієвська, Н.П. (orcid.org/0000-0002-5450-6635) (2019) Cyber security in a digital learning environment Інформаційні технології і засоби навчання, 2 (70). pp. 313-331. ISSN 2076-8184

[img] Text
2876-Article Text-12622-1-10-20190427.pdf - Published Version

Download (388kB)

Abstract

The article discusses the problems of cyber-security of participants of the educational process, emphasizes the fact that these problems are not limited to the technical aspects of the protection of information resources, they must include in their entirety the following types of protection: legal, technical, informational, organizational and psychological. Among the psychological tools for securing cyber-security, it is proposed to distinguish cognitive ones, as the general population, and especially children and youth, increasingly become targets of cyber-attacks, first of all, their cognitive sphere, becoming the most vulnerable (weak) link in the network. In anthropocentric networks, which make up an ever-increasing share among common networks, the network itself acquires new properties, acting as an independent component (in addition to factors such as the network node, interface and links). Threats to participants in the educational process from the cyberspace should be regarded as passive and active, developing adequate means of protection and viability of the system "subject of educational process-learning-environment". The most significant among cyber-threats for the participants of the educational process are the social engineering methods, which knowledge and resistance can be the most effective for providing cyber-security. As part of the training of participants in the educational process on cyber-security, it is proposed to use "cyber vaccination", that is the formation of a conscious cognitive experience of staying under the influence of a cyber threat and counteracting it as a system of training activities that include, in addition to traditional methods, training of "cyber attacks", as well as the formation of knowledge and skills of resilience (recovery) in relation to cyber-threats. Further research is suggested to focus on the detailed development of types of threats to participants in the education process, as well as methods of counteraction. A special place should be a problem of resistance to cyber-threats, which can use the experience of training operators in emergent industries, including assessing the current state of the person and necessary adjustments in order to optimize its performance.

Item Type: Article
Keywords: cyber security, digital environment; educational activity; human factor; cognitive danger, social engineering
Subjects: Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.9 ІКТ ( Application-oriented computer-based techniques )
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 3 Social Sciences > 37 Education > 37.01/.09 Special auxiliary table for theory, principles, methods and organization of education
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 3 Social Sciences > 37 Education > 37.01/.09 Special auxiliary table for theory, principles, methods and organization of education > 37.06 Social problems in education. Human contacts, relationships
Divisions: Information Technologies and Learning Tools > Department of Technologies of Open Learning Environment
Depositing User: с.д/п.н.с. Oleksandr Burov
Date Deposited: 07 Oct 2019 06:35
Last Modified: 07 Oct 2019 06:35
URI: http://lib.iitta.gov.ua/id/eprint/717313

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item