Results for 'Teaching, Information Security'

999 found
Order:
  1. ITS for teaching DES information security Algorithm.Abed Elhaleem A. Alnajar & Monnes Hanjory - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  3. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  4. Web-based School Information and Publication System: A Developmental Study.Kevin Caratiquit - 2021 - Global Education and Social Sciences Journal 1 (3):45-55.
    The study aimed to promote the school online, provide timely, engaging, and current information of the school to employees, learners, parents, and community, share updates of school activities online, supply downloadable instructional materials and resources for both employees and students. Also, it evaluated the assessment of teaching and non-teaching staff, learners, parents and IT specialists to the ISO 25010:2011 software quality standards of the developed Web-based School Information and Publication System along functional and suitability, maintainability, usability, security, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Utilization of Scholarly Journal Articles in the Teaching and Learning of Teacher Education Courses.Derren Gaylo, Manuel Caingcoy & Daisy Mugot - 2020 - Balkan and Near Eastern Journal of Social Sciences 6 (3):59-66.
    The usage of scholarly journal articles in the academe is now gaining attention to cope with the ever dynamic and evolving teaching and learning processes. However, the use implies possible potential usage only because what is measured is the number of views and downloads of the articles. This paper explored how the teacher education faculty and students utilized scholarly journal articles in the teaching and learning of professional education courses. The study also determined the challenges in using these primary sources (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Some discussions on critical information security issues in the artificial intelligence era.Vuong Quan Hoang, Viet-Phuong La, Hong-Son Nguyen & Minh-Hoang Nguyen - manuscript
    The rapid advancement of Information Technology (IT) platforms and programming languages has transformed the dynamics and development of human society. The cyberspace and associated utilities are expanding, leading to a gradual shift from real-world living to virtual life (also known as cyberspace or digital space). The expansion and development of Natural Language Processing (NLP) models and Large Language Models (LLMs) demonstrate human-like characteristics in reasoning, perception, attention, and creativity, helping humans overcome operational barriers. Alongside the immense potential of artificial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  77
    MANAGEMENT OF INFORMATION SECURITY OF THE ENTERPRISE.Tryashchenko Vitaliy & Tytar Tetiana - 2022 - Економіка Та Суспільство 44:1-7.
    The article highlights the current issues related to the management of information provision of the enterprise. It has been specified that complete and reliable information support of business processes is a necessary condition for the effective functioning of the enterprise. It was determined that the information support mechanism for managing the development of business processes should include available information resources, technologies, systems and platforms, software, and qualified personnel responsible for this work. The article examines the works (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Informing, teaching or propagandising? Combining Environmental and Science Studies for undergraduates.Sean Johnston & Mhairi Harvey - 2002 - Discourse: Learning and Teaching in Philosophical and Religious Studies 1 (2):130-140.
    This article discusses experiences in the integrated teaching of Environmental Studies and Science Studies in a generalist curriculum at a university campus in Scotland. At the University of Glasgow Crichton Campus, a mixed curriculum has been developed to combine coherently Environmental and Science Studies, perhaps the first such curriculum in the UK and equally uncommon in America. The Crichton curricum is intentionally multi-disciplinary, drawing closely on the successful nineteenth-century Scottish model exported to America. This generalist approach, emphasising broad philosophical principles, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields.Rene Von Schomberg (ed.) - 2011 - Publications Office of the European Union.
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  13. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi (eds.), 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper (...) countermeasures can be devised. Ontologies are instruments developed to address these conceptual clarification and terminological systematization issues. Over the years, several ontologies have been proposed in Risk Management and Security Engineering. However, as shown in recent literature, they fall short in many respects, including generality and expressivity - the latter impacting on their interoperability with related models. We propose a Reference Ontology for Security Engineering (ROSE) from a Risk Treatment perspective. Our proposal leverages on two existing Reference Ontologies: the Common Ontology of Value and Risk and a Reference Ontology of Prevention, both of which are grounded on the Unified Foundational Ontology (UFO). ROSE is employed for modeling and analysing some cases, in particular providing clarification to the semantically overloaded notion of Security Mechanism. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Information Asymmetries and the Paradox of Sustainable Business Models: Toward an integrated theory of sustainable entrepreneurship.V. Blok - unknown
    In this conceptual paper, the traditional conceptualization of sustainable entrepreneurship is challenged because of a fundamental tension between processes involved in sustainable development and processes involved in entrepreneurship: the concept of sustainable business models contains a paradox, because sustainability involves the reduction of information asymmetries, whereas entrepreneurship involves enhanced and secured levels of information asymmetries. We therefore propose a new and integrated theory of sustainable entrepreneurship that overcomes this paradox. The basic argument is that environmental problems have to (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  17. 'Information as a Condition of Justice in Financial Markets: The Regulation of Credit-Rating Agencies.Boudewijn De Bruin - 2017 - In Lisa Herzog (ed.), Just Financial Markets?: Finance in a Just Society. Oxford University Press. pp. 250-270.
    This chapter argues for deregulation of the credit-rating market. Credit-rating agencies are supposed to contribute to the informational needs of investors trading bonds. They provide ratings of debt issued by corporations and governments, as well as of structured debt instruments (e.g. mortgage-backed securities). As many academics, regulators, and commentators have pointed out, the ratings of structured instruments turned out to be highly inaccurate, and, as a result, they have argued for tighter regulation of the industry. This chapter shows, however, that (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. INFORMATION-THEORETIC LOGIC.John Corcoran - 1998 - In C. Martínez U. Rivas & L. Villegas-Forero (eds.), Truth in Perspective edited by C. Martínez, U. Rivas, L. Villegas-Forero, Ashgate Publishing Limited, Aldershot, England (1998) 113-135. ASHGATE. pp. 113-135.
    Information-theoretic approaches to formal logic analyse the "common intuitive" concept of propositional implication (or argumental validity) in terms of information content of propositions and sets of propositions: one given proposition implies a second if the former contains all of the information contained by the latter; an argument is valid if the conclusion contains no information beyond that of the premise-set. This paper locates information-theoretic approaches historically, philosophically and pragmatically. Advantages and disadvantages are identified by examining (...)
    Download  
     
    Export citation  
     
    Bookmark   22 citations  
  19. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. Models, information and meaning.Marc Artiga - 2020 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 82:101284.
    There has recently been an explosion of formal models of signalling, which have been developed to learn about different aspects of meaning. This paper discusses whether that success can also be used to provide an original naturalistic theory of meaning in terms of information or some related notion. In particular, it argues that, although these models can teach us a lot about different aspects of content, at the moment they fail to support the idea that meaning just is some (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Reconceptualising teaching as transformative practice: Alasdair MacIntyre in the South African context.Dominic Griffiths & Maria Prozesky - 2020 - Journal of Education 2 (79):4-17.
    In its ideal conception, the post-apartheid education landscape is regarded as a site of transformation that promotes democratic ideals such as citizenship, freedom, and critical thought. The role of the educator is pivotal in realising this transformation in the learners she teaches, but this realisation extends beyond merely teaching the curriculum to the educator herself, as the site where these democratic ideals are embodied and enacted. The teacher is thus centrally placed as a moral agent whose behaviour, in the classroom (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Informal Logic: A 'Canadian' Approach to Argument.Federico Puppo (ed.) - 2019 - Windsor, Canada: Windsor Studies in Argumentation.
    The informal logic movement began as an attempt to develop – and teach – an alternative logic which can account for the real life arguing that surrounds us in our daily lives – in newspapers and the popular media, political and social commentary, advertising, and interpersonal exchange. The movement was rooted in research and discussion in Canada and especially at the University of Windsor, and has become a branch of argumentation theory which intersects with related traditions and approaches (notably formal (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  23. Analysis of Cyber Security In E-Governance Utilizing Blockchain Performance.Regonda Nagaraju, Selvanayaki Shanmugam, Sivaram Rajeyyagari, Jupeth Pentang, B. Kiran Bala, Arjun Subburaj & M. Z. M. Nomani - manuscript
    E-Government refers to the administration of Information and Communication Technologies (ICT) to the procedures and functions of the government with the objective of enhancing the transparency, efficiency and participation of the citizens. E-Government is tough systems that require distribution, protection of privacy and security and collapse of these could result in social and economic costs on a large scale. Many of the available e-government systems like electronic identity system of management (eIDs), websites are established at duplicated databases and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. The teaching of computer ethics on computer science and related degree programmes. a European survey.Ioannis Stavrakakis, Damian Gordon, Brendan Tierney, Anna Becevel, Emma Murphy, Gordana Dodig-Crnkovic, Radu Dobrin, Viola Schiaffonati, Cristina Pereira, Svetlana Tikhonenko, J. Paul Gibson, Stephane Maag, Francesco Agresta, Andrea Curley, Michael Collins & Dympna O’Sullivan - 2021 - International Journal of Ethics Education 7 (1):101-129.
    Within the Computer Science community, many ethical issues have emerged as significant and critical concerns. Computer ethics is an academic field in its own right and there are unique ethical issues associated with information technology. It encompasses a range of issues and concerns including privacy and agency around personal information, Artificial Intelligence and pervasive technology, the Internet of Things and surveillance applications. As computing technology impacts society at an ever growing pace, there are growing calls for more computer (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Management Information System of Public Secondary Schools in Sagbayan District: A Proposed Implementation.Fernando Enad & Nestor Balicoco - 2023 - Psychology and Education: A Multidisciplinary Journal 13 (1):1-7.
    This research tackled the challenges public secondary schools in Sagbayan District, Bohol, faced regarding records management. The study employed a mixed research design, combining both descriptive-qualitative and descriptive- quantitative methods. The qualitative phase involved conducting in-depth interviews and focus group discussions with relevant stakeholders involved in records management. On the other hand, the quantitative phase utilized survey questionnaires to gather data from relevant stakeholders to determine the acceptability of the proposed MIS among end-users. The first phase findings revealed various challenges (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Teaching medical ethics and law within medical education: a model for the UK core curriculum.Richard Ashcroft & Donna Dickenson - 1998 - Journal of Medical Ethics 24:188-192.
    Consensus statement by UK teachers of medical ethics and law.
    Download  
     
    Export citation  
     
    Bookmark  
  28. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several results, including: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Debunking Arguments: Mathematics, Logic, and Modal Security.Justin Clarke-Doane - 2017 - In Michael Ruse & Robert J. Richards (eds.), The Cambridge Handbook of Evolutionary Ethics. New York: Cambridge University Press.
    I discuss the structure of genealogical debunking arguments. I argue that they undermine our mathematical beliefs if they undermine our moral beliefs. The contrary appearance stems from a confusion of arithmetic truths with (first-order) logical truths, or from a confusion of reliability with justification. I conclude with a discussion of the cogency of debunking arguments, in light of the above. Their cogency depends on whether information can undermine all of our beliefs of a kind, F, without giving us direct (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  30. Going Back to Normal: A Phenomenological Study on the Challenges and Coping Mechanisms of Junior High School Teachers in the Full Implementation of In-Person Classes in the Public Secondary Schools in the Division of Rizal.Jarom Anero & Eloisa Tamayo - 2023 - Psychology and Education: A Multidisciplinary Journal 12:767-808.
    The study focused on exploring and understanding the challenges junior high school teachers in the Division of Rizal faced during the full implementation of in-person classes and identifying the coping mechanisms they employed to adapt to this new educational landscape. Forty participants were purposefully selected from various public secondary school clusters in the division of Rizal. A qualitative phenomenological design was employed, and the information collected through Google Forms was imported into Microsoft Excel and Microsoft Word. After importing the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Formation of the Economic Security System of Tourism and Hospitality Enterprises.Oleksandr P. Krupskyi, Sergii Sardak, Y. Kolbushkin & Y. Stasyuk - 2019 - Journal of Advanced Research in Law and Economics 10 (4):1159-1175.
    The purpose of the paper is to consider genesis and approaches to forming a security culture of tourism and hospitality enterprises that are superstructures of economic, industrial, professional, household, ecological, psychological and social security. In the research, apart from general scientific methods, we used the collection and analysis of primary information obtained from the survey of 220 respondents. Three areas that have a decisive influence on the security of tourism and hospitality enterprises have been identified: organizational (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Teaching & Learning Guide for: The Epistemic Aims of Democracy.Robert Weston Siscoe - 2023 - Philosophy Compass 18 (11):e12954.
    In order to serve their citizens well, democracies must secure a number of epistemic goods. Take the truth, for example. If a democratic government wants to help its impoverished citizens improve their financial position, then elected officials will need to know what policies truly help those living in poverty. Because truth has such an important role in political decision-making, many defenders of democracy have highlighted the ways in which democratic procedures can lead to the truth. But there are also a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Teaching & Researching Big History: Exploring a New Scholarly Field.Leonid Grinin, David Baker, Esther Quaedackers & Andrey V. Korotayev - 2014 - Volgograd: "Uchitel" Publishing House.
    According to the working definition of the International Big History Association, ‘Big History seeks to understand the integrated history of the Cosmos, Earth, Life and Humanity, using the best available empirical evidence and scholarly methods’. In recent years Big History has been developing very fast indeed. Big History courses are taught in the schools and universities of several dozen countries. Hundreds of researchers are involved in studying and teaching Big History. The unique approach of Big History, the interdisciplinary genre of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The availability of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Probability and Informed Consent.Nir Ben-Moshe, Benjamin A. Levinstein & Jonathan Livengood - 2023 - Theoretical Medicine and Bioethics 44 (6):545-566.
    In this paper, we illustrate some serious difficulties involved in conveying information about uncertain risks and securing informed consent for risky interventions in a clinical setting. We argue that in order to secure informed consent for a medical intervention, physicians often need to do more than report a bare, numerical probability value. When probabilities are given, securing informed consent generally requires communicating how probability expressions are to be interpreted and communicating something about the quality and quantity of the evidence (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. The Role of Philosophy Teaching Methods in Development of Critical Thinking.Levon Babajanyan - 2020 - Scientific and Methodical Journal 1 (Scientific-Methodical Articles):15-26.
    Modern educational systems face challenges arising from technological development, like an extension of media-manipulations, fake news, mass unemployment etc. Modern educational systems integrate the methods of development of the critical thinking in educational process to overcome such challenges, that promotes the development of analytic, synthetic and evaluative skills of the students, as well as helps them to be protected against media-manipulations and fake news, and be competitive, informed and demanded in the labor market. Teaching the scientific discipline of philosophy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Argumentative Skills: A Systematic Framework for Teaching and Learning.David Löwenstein, Anne Burkard, Annett Wienmeister, Henning Franzen & Donata Romizi - 2021 - Journal of Didactics of Philosophy 5 (2):72-100.
    In this paper, we propose a framework for fostering argumentative skills in a systematic way in Philosophy and Ethics classes. We start with a review of curricula and teaching materials from the German-speaking world to show that there is an urgent need for standards for the teaching and learning of argumentation. Against this backdrop, we present a framework for such standards that is intended to tackle these difficulties. The spiral-curricular model of argumentative competences we sketch helps teachers introduce the relevant (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  40. How to Teach Engineering Ethics?: A Retrospective and Prospective Sketch of TU Delft’s Approach to Engineering Ethics Education.J. B. van Grunsven, L. Marin, T. W. Stone, S. Roeser & N. Doorn - 2021 - Advances in Engineering Education 9 (4).
    This paper provides a retrospective and prospective overview of TU Delft’s approach to engineering ethics education. For over twenty years, the Ethics and Philosophy of Technology Section at TU Delft has been at the forefront of engineering ethics education, offering education to a wide range of engineering and design students. The approach developed at TU Delft is deeply informed by the research of the Section, which is centered around Responsible Research and Innovation, Design for Values, and Risk Ethics. These theoretical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Assessing Practice Teachers’ Culturally Responsive Teaching: The Role of Gender and Degree Programs in Competence Development.Manuel Caingcoy, Vivian Irish Lorenzo, Iris April Ramirez, Catherine Libertad, Romeo Pabiona Jr & Ruffie Marie Mier - 2022 - Iafor Journal of Cultural Studies 7 (1):21-35.
    Culturally Responsive Teaching (CRT) weaves together rigor and relevance while it improves student achievement and engagement. The Philippine Department of Education implemented Indigenous People’s education to respond to the demands for culturally responsive teaching. Teacher education graduates are expected to articulate the rootedness of education in sociocultural contexts in creating a learning environment that recognizes respect, connectedness, choice, personal relevance, challenges, engagement, authenticity, and effectiveness. Practice teachers need relevant exposure and immersion to fully develop their competence in CRT. This scenario (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Risk, Rationality and (Information) Resistance: De-rationalizing Elite-group Ignorance.Xin Hui Yong - 2023 - Erkenntnis:1-17.
    There has been a movement aiming to teach agents about their privilege by making the information about their privilege as costless as possible. However, some argue that in risk-sensitive frameworks, such as Lara Buchak’s (2013), it can be rational for privileged agents to shield themselves from learning about their privilege, even if the information is costless and relevant. This threatens the efficacy of these information-access efforts in alleviating the problem of elite-group ignorance. In response, I show that (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Using Argument Diagramming to Teach Critical Thinking in a First-Year Writing Course.Maralee Harrell & Danielle Wetzel - 2015 - In Ron Barnett & Bob Ennis Martin Davies (ed.), Palgrave Handbook of Critical Thinking in Higher Education. pp. 213-232.
    The importance of teaching critical thinking skills at the college level cannot be overemphasized. Teaching a subcategory of these skills—argument analysis—we believe is especially important for first-year students with their college careers, as well as their lives, ahead of them. The struggle, however, is how to effectively teach argument analysis skills that will serve students in a broad range of disciplines.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Computer-Aided Argument Mapping and the Teaching of Critical Thinking (Part 1).Martin Davies - 2012 - Inquiry: Critical Thinking Across the Disciplines 27 (2):15-30.
    This paper is in two parts. Part I outlines three traditional approaches to the teaching of critical thinking: the normative, cognitive psychology, and educational approaches. Each of these approaches is discussed in relation to the influences of various methods of critical thinking instruction. The paper contrasts these approaches with what I call the “visualisation” approach. This approach is explained with reference to computer-aided argument mapping (CAAM) which uses dedicated computer software to represent inferences between premise and conclusions. The paper presents (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. Challenges in Teaching Science and its Transition to Post-Pandemic Education.Nemalynne Atriginio Amigo, Thelma Coloma Damaso, Sharmaine Agustin Diego, Jessica Rabor Laciste, Romelyn Tutaan Lagura, Ryan Bautista Tagata, Nove Lheen Castillo Taguicana & Eisle Keith Rivera Tapia - 2023 - American Journal of Multidisciplinary Research and Innovation 2 (3):15-22.
    The COVID-19 pandemic has had a significant impact on the education sector globally, with over one billion students being held out of school as a result of quarantine measures. In response, education systems had to quickly shift to online learning to ensure that students could continue their education. The sudden shift to online learning has resulted in educators having to adapt to the use of technology in education rapidly. The COVID-19 pandemic has highlighted the importance of digital literacy for educators (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Beyond Information Recall: Sophisticated Multiple-Choice Questions in Philosophy.J. Robert Loftis - 2019 - American Association of Philosophy Teachers Studies in Pedagogy 5:89-122.
    Multiple-choice questions have an undeserved reputation for only being able to test student recall of basic facts. In fact, well-crafted mechanically gradable questions can measure very sophisticated cognitive skills, including those engaged at the highest level of Benjamin Bloom’s taxonomy of outcomes. In this article, I argue that multiple-choice questions should be a part of the diversified assessment portfolio for most philosophy courses. I present three arguments broadly related to fairness. First, multiple-choice questions allow one to consolidate subjective decision making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Perceived Influence of Entrepreneurship Education Methods on Economic Security in Cross River State.Stephen Bepeh Undie, Ezekiel Usip Mfon, Lydia Ochuole Ogbudu, Ubong Edet Uko & Joseph Ogbaji Ebiale - 2023 - Prestige Journal of Education 6 (1):158-171.
    This study investigated the perception of how methods of entrepreneurial education predict the level of economic security in the Southern Senatorial District of Cross River State. It was guided by two research questions and two hypotheses, tested at a significant level of 0.05. The research design was a survey. The study had 350 participants. A 40-item "Entrepreneurship Education and Economic Security Questionnaire" (EEESQ) was validated by five experts from the University of Calabar and used in data collection. The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Online Communication Tools in Teaching Foreign Languages for Education Sustainability.Anna Shutaleva - 2021 - Sustainability 13:11127.
    Higher education curricula are developed based on creating conditions for implementing many professional and universal competencies. In Russia, one of the significant competencies for a modern specialist is business communication in oral and written forms in the Russian language and a foreign language. Therefore, teaching students to write in a foreign language is one of the modern requirements for young specialists’ professional training. This article aimed to study the tools of online communication that are used in teaching foreign languages. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    From year to year some of us, people of planet Earth, Earthlings, attacks intensify on the veto right in the UN Security Council. They consciously or unconsciously ignore its metaphisical, ontological and existential statuses established in 1945 by the founders of the United Nations as a result of the multimillion sacrificial struggle of all Humanity against nazism. Perhaps this is due to a misunderstanding of the metaphysics of international relations, the enduring existential significance of the veto for the viability (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. The Role of the Practice of Excellence Strategies in Education to Achieve Sustainable Competitive Advantage to Institutions of Higher Education-Faculty of Engineering and Information Technology at Al-Azhar University in Gaza a Model.Mazen J. Al Shobaki & Samy S. Abu Naser - 2017 - International Journal of Digital Publication Technology 1 (2):135-157.
    This study aims to look at the role of the practice of excellence strategies in education in achieving sustainable competitive advantage for the Higher educational institutions of the faculty of Engineering and Information Technology at Al-Azhar University in Gaza, a model, and the study considered the competitive advantage of educational institutions stems from the impact on the level of each student, employee, and the institution. The study was based on the premise that the development of strategies for excellence in (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 999