Proceedings of the 2019 2nd International Conference on Education Technology Management最新文献

筛选
英文 中文
A Cyber Environment Approach to Mitigate Vulnerabilities and Threats in an Electoral Process in Ecuador 网络环境方法减轻厄瓜多尔选举过程中的脆弱性和威胁
S. M. Toapanta, Marjorie Isanoa Sinche, Luis Enrique Mafla Gallegos
{"title":"A Cyber Environment Approach to Mitigate Vulnerabilities and Threats in an Electoral Process in Ecuador","authors":"S. M. Toapanta, Marjorie Isanoa Sinche, Luis Enrique Mafla Gallegos","doi":"10.1145/3375900.3375914","DOIUrl":"https://doi.org/10.1145/3375900.3375914","url":null,"abstract":"The problems of information security in the cyber environment regarding vulnerabilities and threats in an electoral process is persistent; the use of technology in political activities for popular elections, through electronic or digital voting, implemented in some Latin American countries, its results have not been acceptable; because they have been criticized by politicians and citizens indicating that transparency is needed in the electoral process. The objective is to focus on the cyber environment to present an alternative to mitigate vulnerabilities and threats in an electoral process considering the integral aspects, understand the benefits it grants, the expenses involved, the probable risks required. It was used the deductive method and exploratory research to analyze the reference articles. It turned out a prototype of the data record, as an alternative that allows the electronic system to establish security mechanisms with confidentiality, integrity, authentication, authorization, accessibility and availability. It was concluded that to comply with an electronic vote with acceptable results and meeting international standards, it is necessary to invest in adequate technology, train people who will participate in the electoral process and establish security mechanisms that mitigate cyber attacks in their environment.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122054872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach of National and International Cybersecurity Laws and Standards to Mitigate Information Risks in Public Organizations of Ecuador 国家和国际网络安全法律和标准降低厄瓜多尔公共组织信息风险的途径
S. M. Toapanta, Alexander Jimenez Gurumendi, Luis Enrique Mafla Gallegos
{"title":"An Approach of National and International Cybersecurity Laws and Standards to Mitigate Information Risks in Public Organizations of Ecuador","authors":"S. M. Toapanta, Alexander Jimenez Gurumendi, Luis Enrique Mafla Gallegos","doi":"10.1145/3375900.3375909","DOIUrl":"https://doi.org/10.1145/3375900.3375909","url":null,"abstract":"Today, cybersecurity is very important, and Ecuador could suffer serious security problems that would compromise the information of its citizens if it does not change its laws and standards in public institutions. The objective of this article was to analyze laws and standards in depth to be able to implement them in organizations public of Ecuador. It was used the deductive and exploratory research method to analyze the information of available media and scientific articles. It resulted in improvements in cybersecurity with the use of standards such as the International Organization for Standardization (ISO) and specific laws for cybersecurity. It was concluded that Ecuador need improve the cybersecurity in public organization, because had leak of information and implementation of laws and standards can help mitigate the risks the information.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133718964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Characterizing the Environmental Kuznets Curve with Identifying its Influencing Factors in the Context of Low-carbon Economy: A Case of Heilongjiang Province, China 低碳经济背景下环境库兹涅茨曲线特征及其影响因素识别——以黑龙江省为例
Tiansen Liu, Yue Zhu, Yi Su
{"title":"Characterizing the Environmental Kuznets Curve with Identifying its Influencing Factors in the Context of Low-carbon Economy: A Case of Heilongjiang Province, China","authors":"Tiansen Liu, Yue Zhu, Yi Su","doi":"10.1145/3375900.3375907","DOIUrl":"https://doi.org/10.1145/3375900.3375907","url":null,"abstract":"Heilongjiang Province of China is an energy-intensive area that is experiencing the low-carbon economy transition to implement the new policy for revitalizing the Northeastern China. Following the hypothesis of Environmental Kuznets Curve with collecting data from 1985 to 2015, this paper examines the relation between per capita emissions of main pollutants as well as CO2 and per capita GDP deflator in Heilongjiang Province. Empirical results present that different from the traditional inverted U-shaped curve that was proposed by Environmental Kuznets Curve hypothesis, the curves between each type of emission and per capita GDP deflator have different shapes. Specifically, the shape of curves between per capita emissions of waste water, waste gas, solid waste, CO2 and per cap GDP deflator are the upright N-shape, inverted N-shape, upright U-shape, and inverted N-shape, respectively. With respect to the influencing factors for the disparity of their shapes, per capita annual total trade, regional energy intensity, industrial structure, and technology progress significantly affect the relation between each per capita emission and per capita GDP deflator, but government corruption can concurrently hinder and promote the environmental quality. This case reflects that in terms of regional environmental governance, the actual administrative efficiency in Heilongjiang Province is still low, and thus it needs to invest the extra opportunity cost to reverse this unfavorable state.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"27 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120820093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Cybersecurity Models Suitable to Apply in an Electoral Process in Ecuador 适用于厄瓜多尔选举过程的网络安全模型分析
S. M. Toapanta, Manuel Agustin Aycart Armijos, Luis Enrique Mafla Gallegos
{"title":"Analysis of Cybersecurity Models Suitable to Apply in an Electoral Process in Ecuador","authors":"S. M. Toapanta, Manuel Agustin Aycart Armijos, Luis Enrique Mafla Gallegos","doi":"10.1145/3375900.3375912","DOIUrl":"https://doi.org/10.1145/3375900.3375912","url":null,"abstract":"Were analyzed different cybersecurity proposals to protect information, such as models, prototypes, approaches, frameworks, algorithms and evaluations. The problem is the lack of application of cybersecurity to electoral processes in Ecuador. The objective is to make an appropriate cybersecurity model to apply in an electoral process in Ecuador. The quantitative, descriptive, deductive reasoning was used to analyze the reference documents. It turned out a Conceptual Cybersecurity Model, a Cybersecurity Algorithm and a General Risk Formula. It was concluded that the model strengthens information security in the electoral process and asset risk assessment prioritizes the attention of vulnerabilities.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proceedings of the 2019 2nd International Conference on Education Technology Management 2019第二届教育技术管理国际会议论文集
{"title":"Proceedings of the 2019 2nd International Conference on Education Technology Management","authors":"","doi":"10.1145/3375900","DOIUrl":"https://doi.org/10.1145/3375900","url":null,"abstract":"","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130093989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Raising Lifelong Learning Skills Using Learning Technology at University for Foreigners of Perugia 佩鲁贾外国人大学利用学习技术提高终身学习技能
Talia Sbardella, V. Santucci, C. Biscarini, Stefania Spina, Giuliana Grego Bolli
{"title":"Raising Lifelong Learning Skills Using Learning Technology at University for Foreigners of Perugia","authors":"Talia Sbardella, V. Santucci, C. Biscarini, Stefania Spina, Giuliana Grego Bolli","doi":"10.1145/3375900.3375920","DOIUrl":"https://doi.org/10.1145/3375900.3375920","url":null,"abstract":"Soft skills are a set of socio-emotional abilities considered as fundamental for personal development, for academic and work achievement and long-term success, and higher education is today called to support the graduates' employability and to provide effective tools to face the contemporary society fostering both technical and soft skills of its students. The University of Foreigners of Perugia has addressed this topic with the adoption of a new lifelong learning skills' development and assessment model based on a social-constructivist view of teaching and learning oriented towards elements of intercultural education, enclosing the training of soft skills into hard skills courses and devising a soft skills' assessment process in order to provide a reliable and suitable procedure both for the community of learners and for assessors. The model has been embedded in few experimental courses selected from different Master's degrees and our teachers was involved in a training pathway using innovative learning technologies such as LMS (Learning Management Systems) and other digital tools in order to foster students' skills. For the pathways has been used approaches as blended learning, collaborative learning, flipped classroom, spaced learning, learning by doing. In this paper we present and analyze the data collected during our courses. The investigation show that the use of learning technology increased students' active participation.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Definition of Parameters to Perform Audit in Cybersecurity for Public one Organization of Ecuador 厄瓜多尔公共机构网络安全审计参数定义
S. M. Toapanta, P. NahimAlexanderPeralta, Luis Enrique Mafla Gallegos
{"title":"Definition of Parameters to Perform Audit in Cybersecurity for Public one Organization of Ecuador","authors":"S. M. Toapanta, P. NahimAlexanderPeralta, Luis Enrique Mafla Gallegos","doi":"10.1145/3375900.3375913","DOIUrl":"https://doi.org/10.1145/3375900.3375913","url":null,"abstract":"Ecuador's constant technological growth is evident in recent years, great efforts have been devoted to the development of information systems for organizations, but only for the development of systems; unfortunately, there are few security controls or maintenance that have been implemented in those already mentioned. Ecuador has been the target of constant attacks and have been the result of the vulnerability of its information security. This is the consequence of having very poor control of their systems due to the neglect of senior management, reduced costs or simply complete ignorance of the subject by the staff. Auditing helps identify weaknesses in an organization in general or in systems where security is important. Every audit process is linked to a plan, realization and results, but it is thanks to the methodology that they will give us indicators to make changes to the system, that these results have relevance; as the parameters to be evaluated from the system are presented in the system. Our goal was to find key parameters for a correct security assessment against a cyberattack. Methodologies from various sources such as books, recognized standards methodologies, standardized guidance processes, among others were adapted and used. It was concluded that using guide the parameters found in our research helps an organization to have a stable yet secure system against a cyberattack.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122798809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prototype to Mitigate the Risks of the Integrity of Cyberattack Information in Electoral Processes in Latin America 减轻拉丁美洲选举过程中网络攻击信息完整性风险的原型
S. M. Toapanta, L. Peñafiel, Luis Enrique Mafla Gallegos
{"title":"Prototype to Mitigate the Risks of the Integrity of Cyberattack Information in Electoral Processes in Latin America","authors":"S. M. Toapanta, L. Peñafiel, Luis Enrique Mafla Gallegos","doi":"10.1145/3375900.3375915","DOIUrl":"https://doi.org/10.1145/3375900.3375915","url":null,"abstract":"The problems of cyberattacks have been frequent in all areas for several years, the use of technology has become an indispensable element in the environment of the electoral process and its activities to mitigate the risks of information. Above all, if one considers that in a process of this nature, it is fundamental to guarantee the security of the system, since they have become the target of cyberattacks that have generated problems by compromising the integrity of the information necessary for this democratic exercise. The main objective was to provide a prototype to mitigate the risks of the integrity of cyberattack information in electoral processes in Latin America. It was used the deductive method and the exploration research technique were applied to study the information of the cited articles. It resulted in a Prototype to mitigate risks of the integrity of cyberattack information, Prototype risk matrix, and Mitigation approach. It was concluded that through the prototype evaluation methods and the risk mitigation process, risk and its value were identified according to the probability of occurrence and impact of cyberattacks, thus classifying them into levels and focusing mitigation by means of security strategies that generate higher priority and protect the integrity of the information before any type, this allows us to feedback and continuously improve the electoral processes.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124537789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on the Case-based Teaching Method in the Circuit Principle Course under Emerging Engineering Education 新兴工程教育下电路原理课程案例教学法的研究
Hongzhi Ouyang
{"title":"Study on the Case-based Teaching Method in the Circuit Principle Course under Emerging Engineering Education","authors":"Hongzhi Ouyang","doi":"10.1145/3375900.3375901","DOIUrl":"https://doi.org/10.1145/3375900.3375901","url":null,"abstract":"The Emerging Engineering Education(3E) is the national strategy for upgrading engineering education implemented by the Ministry of Education in China. Circuits education is crucial in the first phase of any electrical engineering curriculum. In order to change the status that emphasizing theory over practice in the circuit principle course, the core content of the course is divided into several teaching units, and the case-based teaching method is carried out. This paper gives several engineering examples and their implementation process is described, including the human body's resistance model, dual tone multi frequency, etc. For testing the teaching effect, two contrast experiments were designed. The experiment proved that compared with the traditional teaching model, students have significantly improved their active ability, practical ability, and scientific research ability through case-based teaching. So the case-based teaching method is an effective method for new century students.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129202542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity Analysis to Determine the Impact on the Social area in Latin America and the Caribbean 网络安全分析以确定对拉丁美洲和加勒比地区社会领域的影响
S. M. Toapanta, Jorge Mario Estrella Jaramillo, Luis Enrique Mafla Gallegos
{"title":"Cybersecurity Analysis to Determine the Impact on the Social area in Latin America and the Caribbean","authors":"S. M. Toapanta, Jorge Mario Estrella Jaramillo, Luis Enrique Mafla Gallegos","doi":"10.1145/3375900.3375911","DOIUrl":"https://doi.org/10.1145/3375900.3375911","url":null,"abstract":"This document presents an introduction to the events that occurred in Latin America and the Caribbean, where banks are compromised by cyber-attacks, the same case is also seen in Ecuador, where losses from these attacks would amount to $ 6 billion by 2021. Our goal is to provide an analysis that demonstrates the social impact that cybersecurity has in Latin America and the Caribbean and a way to measure cybersecurity to combat threats due to constant technological progress and the great privacy risks presented to the day with cyber systems. The deductive method was used, adopting and generating a set of activities to evaluate the Total Cybersecurity (TC) of the cyber systems and / or companies to have a control of the security that it has and the improvements that can be implemented to prevent or combat Possible cyber threats or vulnerabilities. It resulted in cyber-resilience activities and activities based on the main functions before, during and after a cyber-attack. These activities are evaluated by the frequency of use, allowing each activity to assign a value and in this way apply the formulas proposed and obtain the CT, achieving the percentage of cybersecurity that has been implemented and discovering the weaknesses of the systems that They must be strengthened. It was concluded that in certain countries of Latin America and the Caribbean they have very little interest in the development and expansion of cybersecurity in their lands, unlike the progress of cybersecurity in European countries.","PeriodicalId":215978,"journal":{"name":"Proceedings of the 2019 2nd International Conference on Education Technology Management","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133938207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信