{"title":"The current state of ICT security at Czech primary schools","authors":"J. Hubert, M. Dosedla, K. Picka","doi":"10.1109/ICETA57911.2022.9974797","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974797","url":null,"abstract":"This research study deals with an overview of the findings on the state of information and communication technology (ICT) security in primary schools in the Czech Republic. Due to the constantly developing field, the ever-closer connection between ICT and education, and the number of threats from malware or network attacks, there is a need for sufficient security in schools. The research surveyed the state of security in a sample of 100 schools and analyzed its level. In this respect, the study provides innovative and previously unpublished findings.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Do Neural Networks Recognize Patterns as well as Students?","authors":"Jaroslav Kopčan, M. Klimo, O. Škvarek","doi":"10.1109/ICETA57911.2022.9974725","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974725","url":null,"abstract":"We compare the similarity of humans and one of the current convolutional deep neural network (CNN) LeNet-5 on handwritten digits (MNIST database) recognition under stricter formulated recognition tasks and image degradations caused by a generative adversarial network (GAN). First, a conditional GAN neural network was trained on the MNIST database and generator seeds with normal probability distribution were used. The images for recognition were obtained by the generator that is part of this trained GAN network. Different image degradations were obtained by scaling the length of the input random vector for the generator. Second, as a criterion for the recognition task, we asked the question: Did a person write this digit (without thinning, thickening, protrusions or interruption of the line, no additional image artefacts which a human cannot write with a smooth stroke of the pen)? Human is more robust in most cases of recognizing degraded images. This is since a person who learns to recognize images throughout his life can better comply with the decision criterion than a neural network, which has a much simpler structure than the human brain and learns to recognize only on a limited training set. On the other hand, if we focus recognition criteria on the handwriting of digits, human is more precise, and CNN generalizes the recognised digit more behind this limitation. Our similarity graphs between CNNs and humans can be further used to find the boundaries of the handwritten digits domain and to create a system for recognizing anomalous images.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114415253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phishing as a Cyber Security Threat","authors":"M. Madleňák, K. Kampová","doi":"10.1109/ICETA57911.2022.9974817","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974817","url":null,"abstract":"The aim of this article is to present the threat of phishing within the issue of cyber security and education as one of the tools to reduce it. The article presents procedures for verifying the level of awareness of this threat in a group of selected employees of medical facilities. These procedures consist of a theoretical and a practical part. The theoretical part defines the basic framework of phishing attacks. It describes the basic knowledge and definitions that need to be mastered to understand the given area. The practical part consists of testing the readiness of a specific reference group of users through phishing trainings and phishing tests. The data collected from the testing was further analyzed and compared to determine the potential use of phishing training and phishing testing in organizations.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sectoral Strategy for Human Resources Development in the Information Technologies and Telecommunication Sector by 2030","authors":"Alena Minns","doi":"10.1109/ICETA57911.2022.9974956","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974956","url":null,"abstract":"This contribution presents the main information about The Sectoral Strategy for the Development of Human Resources in the Information Technology and Telecommunications Sector by 2030 and its measures and detailed solutions that reflect the current and future needs of the sector.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124931556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sveda, V. Hubeňáková, M. Babinčáková, M. Kireš, K. Kozelková, K. Lukáčová, A. Mišianiková, V. Ondová
{"title":"Digital transformation of education with the support of the national project IT Academy","authors":"D. Sveda, V. Hubeňáková, M. Babinčáková, M. Kireš, K. Kozelková, K. Lukáčová, A. Mišianiková, V. Ondová","doi":"10.1109/ICETA57911.2022.9974646","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974646","url":null,"abstract":"One of the IT Academy national project aims was to support the digital transformation of schools. Digital transformation is an inevitable condition for innovation of the educational system, as well as the needs of the digital society. The paper presents training and support of the newly established role - the school digital coordinator. The training and subsequent support contents were developed, and conducted, to sustain the role of digital coordinators at their schools.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Jakab, J. Molitorisová, R. Vápeník, D. Cymbalák, J. Kováčová
{"title":"Aggregation and Evaluation of Communication Data of Large Telepresentation Infrastructure based on Computing Nodes on Critical Endpoints","authors":"F. Jakab, J. Molitorisová, R. Vápeník, D. Cymbalák, J. Kováčová","doi":"10.1109/ICETA57911.2022.9974757","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974757","url":null,"abstract":"This paper introduces an architecture of model solution for aggregation, evaluation and in the last step also visualization extended data related to videoconferences held by heterogenous environment of Slovak's National Telepresence Infrastructure (NTI). The main aim of this system is to properly process, and aggregate multiple attributes of videoconferences obtained on computing nodes located on critical endpoints and display them graphically for a straightforward overview. Different types of graphs are used to visualize basic videoconferences properties, while for overall statistics table visualization is used. Processed historical data is subsequently used to predict the upcoming number of videoconferences in near future and the number of videoconferences related to the particular organization for the modeled period.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123828871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Mulesa, I. Myronyuk, O. Kachmar, F. Jakab, O. Yatsyna
{"title":"Decision-Making Modeling in Educational Process Organization Under the Conditions of Crisis Situations Forecasting","authors":"O. Mulesa, I. Myronyuk, O. Kachmar, F. Jakab, O. Yatsyna","doi":"10.1109/ICETA57911.2022.9974909","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974909","url":null,"abstract":"The research deals with the problem of decision- making processes, related to the optimization of educational process. The case of shortening the length of academic semesters due to an increase in the weekly workload is considered. The mathematical model was built for the most effective use of existing audiences. It is possible to develop options for management decisions regarding the combined (face-to-face and distance learning with the use of electronic learning tools) as forms of education.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Długosz, Michał Brodzicki, P. Skruch, M. Szelest, D. Cieslar
{"title":"Intelligent road recognition system for an autonomous vehicle","authors":"M. Długosz, Michał Brodzicki, P. Skruch, M. Szelest, D. Cieslar","doi":"10.1109/ICETA57911.2022.9974839","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974839","url":null,"abstract":"The article described the car road detection system. This type of system, also known as green carpet or free space system, is part of an advanced driver assistance system (ADAS). The proposed system works by using the image of the camera located at the front of the car. The road detection system uses various operations on the image in appropriately selected color spaces. To improve the detection and reliability of the developed system, shadow areas are removed from the input images. The operation of the road detection system was practically tested using an experimental electric vehicle.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132677078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Therapist-patient interaction in virtual reality at the level of the upper limbs","authors":"B. Sobota, Š. Korečko, J. Gvuščová, M. Mattová","doi":"10.1109/ICETA57911.2022.9974677","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974677","url":null,"abstract":"This paper describes upper extremity interaction system implemented in collaborative virtual reality. Main focus of the paper is to the description of the functionality of animation settings within the parameters of interaction/rehabilitation, visualization and functionalization of the system. With this system, the patient can be stimulated under the supervision of a therapist to practice some rehabilitation/training procedures. Due to the use of collaborative virtual reality, this process can be also applied in a distance form and thus it expands the therapist-patient interaction.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114880414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gamification of cyber ranges in cybersecurity education","authors":"Martin Jelo, P. Helebrandt","doi":"10.1109/ICETA57911.2022.9974714","DOIUrl":"https://doi.org/10.1109/ICETA57911.2022.9974714","url":null,"abstract":"There is a lack of cybersecurity experts, and this problem is getting worse with the increasing number and importance of IT systems together with rising number and sophistication of attacks. Rapid development in cybersecurity necessitates constant training and practice to keep up with the latest threats. Studying IT, and especially cybersecurity is considered difficult and there is an urgent need to encourage interest of students in this field. One promising avenue to improving the situation is gamification. Gamification has been used in education to improve enthusiasm of students, increasing their numbers, information uptake and retention. Leveraging social connections and human competitiveness can further motivate students to take part and engage in the learning activities they would otherwise not consider. Virtualized environments offer means to scale up the practical training as well as share latest teaching methods. Cyber ranges used by educational institutions often are such open platforms that provide such practical cybersecurity training. Moreover, with some thoughtful planning they can prove to be popular serious games. In this paper, we explore opportunities for hands-on cybersecurity education by using gamified scenarios in cyber range virtualized environment. We focus on cyber testing environments, what their types are, and what it includes. We place emphasis on creating basic game scenario close to real-world situations.","PeriodicalId":151344,"journal":{"name":"2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116452234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}