THE STATUS OF INFORMATION SECURITY COMPETENCE FORMEDNESS OF FUTURE COMPUTER SCIENCE TEACHERS
PDF (Ukrainian)

Keywords

cybersecurity
information security
future teacher of computer science
competence
cloud technologies
pedagogical experiment

How to Cite

[1]
V. P. Oleksiuk and O. R. Oleksiuk, “THE STATUS OF INFORMATION SECURITY COMPETENCE FORMEDNESS OF FUTURE COMPUTER SCIENCE TEACHERS”, ITLT, vol. 62, no. 6, pp. 277–291, Dec. 2017, doi: 10.33407/itlt.v62i6.1906.

Abstract

In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specificity of the future computer science teachers' study in the context of developing of their competences necessary for safe students’ activity in the computer networks and Internet. Particular attention is paid to the threats arising after introduction cloud technologies various service models into the educational process. The article focuses on methods and stages of the pedagogical investigation of correlation between the operational and reflective components of the professional competencies of future computer science teachers.
PDF (Ukrainian)

References

Ю. С. Рамський, "Професійна діяльність вчителя в епоху інформатизації освіти" [Електронний ресурс]. Доступно: http://enpuir.npu.edu.ua/handle/123456789/9387.

Д. Лайон, "Інформаційне суспільство: проблеми та ілюзії", Сучасна зарубіжна соціальна філософія, 1996. [З мережі]. Доступно: http://www.philsci.univ.kiev.ua/biblio/lajon.html.

В. Ю. Биков, "Навчальне середовище сучасних педагогічних систем. Професійна освіта: педагогіка і психологія", Вища Педагогічна Школа у Честохові, Ченстохов, с. 59–80, 2004.

О. М. Спірін, та В. Н. Ковальчук, "Методика забезпечення он-лайн безпеки старшокласників у навчально-виховному процесі школи", Інформаційні технології і засоби навчання, №1(21), 2011 [Електронний ресурс]. Доступно: https://journal.iitta.gov.ua/index.php/itlt/article/view/411/368.

В. Биков та ін., Оцінювання інформаційно-комунікаційної компетентності учнів та педагогів в умовах євроінтеграційних процесів в освіті, К, Україна: Педагогічна думка, 2017.

Н. П. Дементієвська, "Критичне оцінювання інтернет-ресурсів при вивченні природничих наук" [Електронний ресурс]. Доступно: http://lib.iitta.gov.ua/4586/1/Кіровоград_2014_Дементієвська_тези1.pdf.

Н. В. Морзе, В. П. Вембер, О. В. Барна, та О. Г. Кузьмінська, "Інформатика-6: навчання через діяльність", Інформатика та інформаційні технології в навчальних закладах, №4 (52), 2014. [Електронний ресурс]. Доступно: http://elibrary.kubg.edu.ua/6323/.

В. Ю. Биков, М. П. Шишкіна, "Хмарні технології як імператив модернізації освітньо-наукового середовища вищого навчального закладу", Теорія і практика управління соціальними системами. № 4, 2016, [Електронний ресурс]. Доступно: http://nbuv.gov.ua/UJRN/Tipuss_2016_4_8.

"Online Browsing Platform (OBP)", Iso.org, 2017. [Online]. Available: https://www.iso.org/obp/ui/#iso:std:iso-iec:27002:ed-2:v1:en.

"Концепція інформаційної безпеки України", Osce.org, 2017. [Електронний ресурс]. Доступно: http://www.osce.org/uk/fom/175056?download=true.

Указ Президента України Про рішення Ради національної безпеки і оборони України від 29 грудня 2016 року "Про Доктрину інформаційної безпеки України" (2017, Лют. 25). [Електронний ресурс]. Доступно: http://zakon2.rada.gov.ua/laws/show/47/2017#n12.

В. Ковальчук, "Забезпечення інформаційної безпеки старшокласників у комп’ютерно орієнтованому навчальному середовищі", дис. канд. пед. наук., Інститут інформаційних технологій і засобів навчання НАПН України, Київ, 2013.

Directive (EU) 2016/680 Of The European Parliament And Of The Council.(2016, April 27 )"on the protection of natural persons with regard to the processing of personal data by competent authorities. Council Framework Decision 2008/977/JHA", Eur-lex.europa.eu, [Online]. Available: http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016L0680&from=EN.

D. Van Rooyand J. Bus, "Trust and privacy in the future Internet—a research perspective", Identity in the Information Society, vol. 3, no. 2, pp. 397-404, 2010.[Online]. Available: https://doi.org/10.1007/s12394-010-0058-7.

M. Whitmanand H. Mattord, Principles of information security. Boston, MA: Course Technology, 2012.

J. L. Spears "Defining information security". In:5th security conference, LasVegas, Nevada, The Information Institute, Washington Dc, Usa. 2006.[Online]. Available:http://www.isy.vcu.edu/~gdhillon/Old2/secconf/pdfs/11.pdf.

"Subject Benchmark", Qaa.ac.uk, 2016. [Online]. Available: http://www.qaa.ac.uk/en/Publications/Documents/SBS-Computing-16.pdf. [Accessed: 11- Oct- 2017].

"Alabama Cyber Security Programs", Cyber Degrees, 2017. [Online]. Available: http://www.cyberdegrees.org/listings/alabama/.

"CIAS Home", Cias.utsa.edu, 2017. [Online]. Available: http://jic.nv.gov/uploadedFiles/jicnvgov/content/Events/P%20ICM%20NV.pdf.

"Стандарт вищої освіти підготовки бакалаврів спеціальності 125 Кібербезпека" [Електронний ресурс]. Доступно: http://mon.gov.ua/content/Новини/2016/07/07/01/125-kiberbezpeka.doc

ENISA, "The newusers' guide: How to raise information security awareness (EN) – ENISA", Enisa.europa.eu, 2010. [Online]. Available: https://www.enisa.europa.eu/publications/archive/copy_of_new-users-guide.

И. А. Зимняя "Компетенция и компетентность в контексте компетентностного подхода в образовании" [Електронний ресурс]. Доступно: http://www.rusreadorg.ru/ckeditor_assets/attachments/63/i_a_zymnaya_competency_and_competence.pdf

Ю. С. Рамський, "Методична система формування інформаційної культури майбутніх вчителів математики", дис. д-ра. пед. наук., НПУ імені М. П. Драгоманова, Київ, 2013.

В. Биков, "Технології хмарних обчислень, ІКТ-аутсорсінг та нові функції ІКТ-підрозділів навчальних закладів і наукових установ", Інформаційні технології в освіті, Вип. 10, с. 8-23, 2011.

H. Takabi, J. Joshi, G-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security and Privacy Magazinepp. 24-31, 8, 2011. [Online]. Available: https://www.researchgate.net/publication/224202015_Security_and_Privacy_Challenges_in_Cloud_Computing_Environments.

Технология облачных вычислений. [Електронний ресурс]. Доступно: http://sd-company.su/article/cloud/technology

O. G. Glazunova, T. V. Voloshyna, "Hybrid Cloud-Oriented Educational Environment for Training Future IT Specialists". Proc. 12-th Int. Conf. ICTERI 2016, 2016. [Online]. Available: http://ceur-ws.org/Vol-1614/paper_64.pdf (2016)[Accessed: 11- Oct- 2017]

M. P. Shyshkina,The Hybrid Cloud-based Service Model of Learning Resources Access andits Evaluation. Proc. 12-th Int. conf. ICTERI 2016, 2016. [Online]. Available: http://ceur-ws.org/Vol-1614/paper_57.pdf

В. П. Олексюк "Проектування моделі хмарної інфраструктури ВНЗ на основі платформи ApacheCloudstack", Інформаційні технології і засоби навчання, Вип. 4 (54), с. 153-164, 2016.

M. Sundgren, "Blurring time and place in higher education with bring your own device applications: a literature review", Education and Information Technologies, pp. 1-39, 2017. [Online]. Available: https://doi.org/10.1007/s10639-017-9576-3.

P. Y. Chen, P. M. Popovich,Correlation. Parametric and nonparametric measures. Papers Series on Quantitative Applications in the Social Sciences, CA: Sage, 2002.


REFERENCES (TRANSLATED AND TRANSLITERATED)

Iu.S. Ramskyi, "Professional activity of the teacher in the era of informatization of education".[Online]. Available: http://enpuir.npu.edu.ua/handle/123456789/9387. (in Ukrainian)

D. Laion, "Information Society: Problems and Illusions", Modern Foreign Social Philosophy, 1996. [Online]. Available: http://www.philsci.univ.kiev.ua/biblio/lajon.html. (in Ukrainian)

V.Yu. Bykov, "Educational environment of modern pedagogical systems: vocational education: pedagogy and psychology", Higher Pedagogical School in Czestochov, Czestochov, pp. 59–80, 2004. (in Ukrainian)

O.M. Spirin, and V.N. Kovalchuk, "Methodic of the on-line safety of the senior pupils in the teaching and educational process at school", Information technologies and learning tools, №1(21), 2011.[Online]. Available:https://journal.iitta.gov.ua/index.php/ itlt/article/view/411/368. (in Ukrainian)

V.Yu. Bykov and others, Evaluation of information and communication competence of pupils and teachers in the conditions of European integration processes in education. K, Ukraine: Pedahohichnadumka, 2017. (in Ukrainian)

N.P. Dementiievska, "Critical evaluation of Internet resources in the study of natural sciences" [Online]. Available: http://lib.iitta.gov.ua/4586/1/ Кіровоград_2014_Дементієвська_тези1.pdf. (in Ukrainian)

N.V. Morze, V.P.Vember, O.V.Barna, ta O.H. Kuzminska, " Informatics-6: learning through activity", Informatics and information technologies in educational institutions, №4 (52), 2014. [Online]. Available: http://elibrary.kubg.edu.ua/6323/. (in Ukrainian)

V.Yu. Bykov, M.P.Shyshkina, "The cloud computing as imperative of the university education and research environment modernization".The theory and practice of social systems management. № 4, 2016, [Online]. Available: http://nbuv.gov.ua/UJRN/Tipuss_2016_4_8 (in Ukrainian)

"Online Browsing Platform (OBP)", Iso.org, 2017. [Online]. Available: https://www.iso.org/obp/ui/#iso:std:iso-iec:27002:ed-2:v1:en. (in English)

"The Concept of Information Security of Ukraine ", Osce.org, 2017. [Online]. Available: http://www.osce.org/uk/fom/175056?download=true. (in Ukrainian)

Decree of the President of Ukraine “On the Information Security Doctrine of Ukraine” (2017, Feb. 25). [Online]. Available: http://zakon2.rada.gov.ua/laws/show/47/2017#n12. (in Ukrainian)

V.N. Kovalchuk, "Providing information security in a computer-oriented educational environment", PhD thesis, Institute of Information Technologies and Learning Tools of NAES of Ukraine, Kyiv, 2013. (in Ukrainian)

Directive (EU) 2016/680 Of The European Parliament And Of The Council.(2016, April 27 )"on the protection of natural persons with regard to the processing of personal data by competent authorities. Council Framework Decision 2008/977/JHA", Eur-lex.europa.eu, [Online]. Available: http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016L0680&from=EN. (in English)

D. van Rooy and J. Bus, "Trust and privacy in the future Internet—a research perspective", Identity in the Information Society, vol. 3, no. 2, pp. 397-404, 2010.[Online]. Available: https://doi.org/10.1007/s12394-010-0058-7. (in English)

M. Whitman and H. Mattord, Principles of information security. Boston, MA: Course Technology, 2012. (in English)

J.L. Spears "Defining information security". In:5th security conference, Las Vegas, Nevada, The Information Institute, Washington Dc, Usa. 2006.[Online]. Available:http://www.isy.vcu.edu/~gdhillon/Old2/secconf/pdfs/11.pdf. (in English)

"Subject Benchmark", Qaa.ac.uk, 2016. [Online]. Available: http://www.qaa.ac.uk/en/Publications/Documents/SBS-Computing-16.pdf. (in English)

"Alabama Cyber Security Programs", Cyber Degrees, 2017. [Online]. Available: http://www.cyberdegrees.org/listings/alabama/.(in English)

"CIAS Home", Cias.utsa.edu, 2017. [Online]. Available: http://jic.nv.gov/uploadedFiles/jicnvgov/content/Events/P%20ICM%20NV.pdf. (in English)

"Standards for higher education of bachelors of specialty 125 Cybersecurity." [Online]. Available: http://mon.gov.ua/content/Новини/2016/07/07/01/125-kiberbezpeka.doc. (in Ukrainian)

ENISA, "The new users' guide: How to raise information security awareness (EN) – ENISA", Enisa.europa.eu, 2010. [Online]. Available: https://www.enisa.europa.eu/publications/archive/copy_of_new-users-guide. [Accessed: 11- Oct- 2017]. (in English)

I.A. Zimnjaja" Competence and competence in the context of a competence approach in education" [Online]. Available:http://www.rusreadorg.ru/ckeditor_assets/ attachments/63/i_a_zymnaya_competency_and_competence.pdf (in Russian)

Iu.S. Ramskyi, "The methodical system of information culture forming of future teachers of Mathematics ", the dissertation of the doctor of sciences.,NPU named after M.P. Drahomanov, Kyiv, 2013.(in Ukrainian)

V.Yu. Bykov, " ICT-outsourcing and new functions of ICT departments of educational and scientific institutions", Information Technologies in education, 10, pp. 8-23, 2011.(in Ukrainian)

H. Takabi, J. Joshi, G-J. Ahn, "Security and Privacy Challenges in Cloud Computing Environments", IEEE Security and Privacy Magazine pp. 24-31, 8, 2011. [Online]. Available: https://www.researchgate.net/publication/224202015_Security_and_Privacy_ Challenges_in_Cloud_Computing_Environments. (in English)

Cloud computing technology. [Online]. Available:http://sd-company.su/article/cloud/technology (2017) (in English)

O. G. Glazunova, T. V. Voloshyna, "Hybrid Cloud-Oriented Educational Environment for Training Future IT Specialists". Proc. 12-th Int. Conf. ICTERI 2016, 2016. [Online]. Available: http://ceur-ws.org/Vol-1614/paper_64.pdf (2016)

M. P. Shyshkina, The Hybrid Cloud-based Service Model of Learning Resources Access and its Evaluation. Proc. 12-th Int. conf. ICTERI 2016, 2016. [Online]. Available: http://ceur-ws.org/Vol-1614/paper_57.pdf (in English)

V.P Oleksiuk "Designing of university cloud infrastructure based on Apache Cloudstack", Information technologies and learning tools,4 (54), pp. 153-164, 2016.(in Ukrainian)

M. Sundgren, "Blurring time and place in higher education with bring your own device applications: a literature review", Education and Information Technologies, pp. 1-39, 2017.[Online]. Available: https://doi.org/10.1007/s10639-017-9576-3. (in English)

P. Y. Chen, P. M. Popovich, Correlation. Parametric and nonparametric measures. Papers Series on Quantitative Applications in the Social Sciences, CA: Sage, 2002. (in English)

Authors who publish in this journal agree to the following terms:

  1. Authors hold copyright immediately after publication of their works and retain publishing rights without any restrictions.
  2. The copyright commencement date complies the publication date of the issue, where the article is included in.

Content Licensing

  1. Authors grant the journal a right of the first publication of the work under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others freely to read, download, copy and print submissions, search content and link to published articles, disseminate their full text and use them for any legitimate non-commercial purposes (i.e. educational or scientific) with the mandatory reference to the article’s authors and initial publication in this journal.
  2. Original published articles cannot be used by users (exept authors) for commercial purposes or distributed by third-party intermediary organizations for a fee.

Deposit Policy

  1. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) during the editorial process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (see this journal’s registered deposit policy at Sherpa/Romeo directory).
  2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
  3. Post-print (post-refereeing manuscript version) and publisher's PDF-version self-archiving is allowed.
  4. Archiving the pre-print (pre-refereeing manuscript version) not allowed.

Downloads

Download data is not yet available.