CYBERSECURITY AND INNOVATIVE DIGITAL EDUCATIONAL ENVIRONMENT
PDF

Keywords

ICT
innovation
digital information environment
media
intellectual property
cyber-safety

How to Cite

[1]
O. Burov, O. Butnik-Siversky, O. Orliuk, and K. Horska, “CYBERSECURITY AND INNOVATIVE DIGITAL EDUCATIONAL ENVIRONMENT”, ITLT, vol. 80, no. 6, pp. 414–430, Dec. 2020, doi: 10.33407/itlt.v80i6.4159.

Abstract

The article considers interaction of innovation, cybersecurity, and digital education environment. It has been demonstrated that comprehensive digitalization of society is being accompanied by changes in the innovative potential and educational needs of Ukraine, especially in the development of the human intellectual capital and its protection in the digital environment. Human capital in innovation plays a significant role, especially in the digital age. Young people are considered as a vulnerable group that could be the main goal of cyber cognitive operations and as the weakest link of the System. The analysis of the Global Innovation Report has revealed that the real level of digitalization in Ukraine does not match its actual human potential and creative outputs. Ukraine has faced gaps in the triangle "human capital (potential) - technological support of innovations - creative activity" that should be eliminated to increase the national Global Innovation Index (GII). Human talent and competence (as a capital) are developed in the learning process. It has been noted that a joint project is the weakest link in terms of intellectual capital and the intellectual property right. Personal information about the project competitors is usually not defended. The issues of innovation in the digital learning environment exacerbate the issues of cybersafety of the education process participants.The traditional cybersecurity approach is unable to detect and tackle new sophisticated attacks. The authors have developed a general model of cyber threats in the field of education and mitigation of their impact.The new strategy in cybersecurity is proposed: not only prompt defence, but threat hunting and resilience training of users. Threat hunting can be presented by two approaches: threat detection (reactive) and threat discovery (proactive), as components of the proposed model. The resilience training of users is associated with threat awareness and special cybersafety training. A general model of cyber threats in the field of education and ways to avoid them is presented. Special attention should be paid to the strengthening of the role of media in educational processes in digital environment, as a current area of cyber hazards. The role of media in stimulating horizontal communication in the educational process is growing. Participants in the digital environment are confidently turning from passive consumers to prosumers, and the media are becoming an information intermediary with a double function: a platform for providing access and information exchange in the educational process and technological tools for joint creation of products (creative commons).

PDF

References

Creating Healthy Lives — The Future of Medical Innovation. Key Findings. Cornell University, INSEAD, and WIPO, 2020. [Online]. Available: https://www.wipo.int/edocs/pubdocs/en/wipo_pub_gii_2019-intro3.pdf. Accessed on: 16.08.2020 (in English)

The Global Innovation Index 2014: The Human Factor In innovation. Cornell University, INSEAD, and WIPO, Fontainebleau, Ithaca, and Geneva, 2014. Accessed on: http://www.wipo.int/econ_stat/ru/economics/gii. 428 p. Accessed on: 16.08.2020 (in English)

D. Frezzo, “The role of technology in the education of the future,” World Economic Forum, 2020. [Online]. Available: https://www.weforum.org/agenda/2017/05/science-of-learning/ Accessed on: 15.09.2020 (in English)

Schools of the Future: Defining New Models of Education for the Fourth Industrial Revolution, World Economic Forum, 2020. [online] Available: http://www3.weforum.org/docs/WEF_Schools_of_the_Future_ Report_2019.pdf. Accessed on: 15.09.2020 (in English)

O. Yu. Burov, "Individual abilities and lifelong learning," Information Technologies and Learning Tools, 5(55), pp.1-11. 2016.https://doi.org/10.33407/ITLT.V55I5.1487. (in English)

O. Orliuk, “Education on intellectual property in the higher education system of Ukraine: problems and tasks,” Teorіya і praktika іntelektual'noї vlasnostі, 6, pp.148-159, 2019. (in Ukrainian)

A.Pipikaite, and N. Davis, “Why cybersecurity matters more than ever during the coronavirus pandemic,” World Economic Forum, 2020. [online] Available: https://www.weforum.org/agenda/2020/03/coronavirus-pandemic-cybersecurity. Accessed on: 15.08.2020 (in English)

The Ultimate List Of Cyber Security Statistics For 2019. PurpleSec LLC. [Online] Available: https://purplesec.us/resources/cyber-security-statistics/ Accessed on: 16.08.2020 (in English)

Beware of criminals pretending to be WHO. World Health Organization, 2020. [Online] Available: https://www.who.int/about/communications/cyber-security/. Accessed on: 16.08.2020 (in English)

Joseph S. Nye, “Technology is driving another global power shift,” The Strategist, 7 Aug 2020. [Online] Available: https://www.aspistrategist.org.au/technology-is-driving-another-global-power-shift/. Accessed on: 18.08.2020 (in English)

R. Danzig, “Technology Roulette: Managing Loss of Control as Many Militaries Pursue Technological Superiority,” Technology & National Security, June 2018. [Online] Available: https://s3.amazonaws.com/files.cnas.org/documents/CNASReport-Technology-Roulette-DoSproof2v2.pdf?mtime= 20180628072101. Accessed on: 16.08.2020 (in English)

A. L. Grinin, L. E. Grinin, “ Leading technologies of the sixth technological order,” 2017. [Online] Available: https://www.researchgate.net/profile/Leonid_Grinin/publication/323996170_VEDUSIE_TEHNOLOGII_SESTOGO_TEHNOLOGICESKOGO_UKLADA/links/5ab78ea5aca2722b97cea5cc/VEDUSIE-TEHNOLOGII-SESTOGO-TEHNOLOGICESKOGO-UKLADA.pdf. Accessed on: 16.08.2020 (in Russian)

Derwent Top 100 Global Innovators™. Clarivate Analitics Derwent, 2020. [Online]. Available: https://clarivate.com/derwent/top100innovators/ Accessed on: 20.08.2020 (in English)

“New List of Top 100 Innovative Companies in the World.” [Online] Available: https://clarivate.ru/blog/2020_02_derwent_top100_innovators. Accessed 20.08.2020 (in Russian)

C. Li, and F. Lalan, “The COVID-19 pandemic has changed education forever. This is how.” [Online] Available: https://www.weforum.org/agenda/2020/04/coronavirus-education-global-covid19-online-digital-learning. Accessed on: 21.08.2020 (in English)

O. Yu. Burov, "Technology and innovation in human activity of the information age: information challenges and technologies," Information Technologies and Learning Tools, 5 (49), pp.16-25. https://doi.org/10.33407/itlt.v49i5.1274. 2015 (in Ukrainian)

António Guterres, "The future of education is here." Launch of the policy brief: education during COVID-19 and beyond,” United Nations. [Online] Available: https://www.un.org/en/coronavirus/future-education-here. Accessed on: August 04, 2020 (in English)

A. V. Iatsyshyn, et al., “Application of augmented reality technologies for preparation of specialists of new technological era,” Application of augmented reality technologies for preparation of specialists of new technological era, Augmented Reality in Education: Proceedings of the 2nd International Workshop (AREdu 2019), KryvyiRih, Ukraine, March 22, 2019, pp. 181-200. ISSN 1613-0073. [Online] Available: http://ceur-ws.org/Vol-2547/paper14.pdf, 2020 (in English)

O. P. Pinchuk et al., “Digital transformation of learning environment: aspect of cognitive activity of students,” In: Proceedings of the 6th Workshop on Cloud Technologies in Education (CTE 2018), KryvyiRih, Ukraine, December 21, 2018 (No. 2433, pp. 90-101). CEUR Workshop Proceedings, 2019 (in English)

Carlos J. Ochoa, “Disruptive Education through Immersive Learning Technologies,” VRARA Education Committee. Piacenza (Italy), 24.09.2019. [Online] Available: https://www.thevrara.com/blog2/2019/10/29/disruptive-education-through-immersive-learning-technologies. Accessed on: 21.08.2020 (in English)

О.Ju. Burov, “Educational Networking: Human View to Cyber Defense,” Information Technologies and Learning Tools, 52, pp.144—156. https://doi.org/10.33407/itlt.v52i2.1398.2016 (in English)

Apple, Google, Samsung, Xiaomi and even Adidas: the most innovative companies in the world are named. 29.06.2020. [Online]. Available: https://ichip.ru/novosti/apple-google-samsung-xiaomi-i-dazhe-adidas-nazvany-samye-innovacionnye-kompanii-mira-728042. Accessed on: 22.08.2020 (in English)

Z. Yan, T. Robertson, R. Yan, Sung Yong Park, S. Bordoff, Q. Chen, and E. Sprissler, “Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?”, Computers in Human Behavior, vol. 84, pp. 375-382, 2018 (in English)

R. M. Hernandez, “Impacto de las TIC en la educación: Retos y Perspectivas. Propósitos y Representaciones,” 5(1), pp.325 - 347 http://dx.doi.org/10.20511/pyr2017.v5n1.149(2017) Accessed on: 22.08.2020 (in Spanish)

Antonio-José Moreno-Guerrero, et al., “WhatsApp and Google Drive Influence on Pre-service Students’ Learning,” Front. Educ., 18 August 2020. [Online] Available: https://www.frontiersin.org/articles/10.3389/feduc.2020.00152/full#B19, 2020 Accessed on: 22.08.2020 (in English)

O. B. Butnik-Siverskyi, “Development of intellectual capital and its components in the aspect of processes of intellectualization, capitalization and transformation (theoretical and methodological digression).” Vseukrainskyi seminar z problem ekonomiky intelektualnoi vlasnosti: zbirnyk naukovykh prats II Vseukrainskoi naukovo-praktychnoi konferentsii (Kyiv, 24 May 2019) NDI intelektualnoi vlasnosti NAPrN Ukrainy. K., pp.9-46 (in Ukrainian)

D. Elliott and L. Quest, “It’s Time to Redefine How Data Is Governed, Controlled and Shared. Here’s How.” [Online] Available: https://www.brinknews.com/its-time-to-redefine-how-data-is-governed-controlled-and-shared-heres-how/ Accessed on: 22.08.2020 (in English)

H. Androshchuk, “Trends in the development of artificial intelligence technologies: economic and legal aspect,” Teoriia I praktyka intelektualnoi vlasnosti, no. 3, pp.84-101, 2019. doi: https://doi.org/10.33731/32019.173817 (in Ukrainian)

K. Horska, “Chapter16. Media content: regulatory challenges in digital environment,” Professionalism in journalism in the era of new media, Logos Verlag Berlin GmbH, 2015. (in English)

Yuliya Krylova-Grek, “Psycholinguistic Aspects of Humanitarian Component of Cybersecurity,” Psycholinguistics, 26(1), pp.199–215, 2019, doi: 10.31470/2309-1797-2019-26-1-199-215. (in English)

Authors who publish in this journal agree to the following terms:

  1. Authors hold copyright immediately after publication of their works and retain publishing rights without any restrictions.
  2. The copyright commencement date complies the publication date of the issue, where the article is included in.

Content Licensing

  1. Authors grant the journal a right of the first publication of the work under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others freely to read, download, copy and print submissions, search content and link to published articles, disseminate their full text and use them for any legitimate non-commercial purposes (i.e. educational or scientific) with the mandatory reference to the article’s authors and initial publication in this journal.
  2. Original published articles cannot be used by users (exept authors) for commercial purposes or distributed by third-party intermediary organizations for a fee.

Deposit Policy

  1. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) during the editorial process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (see this journal’s registered deposit policy at Sherpa/Romeo directory).
  2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
  3. Post-print (post-refereeing manuscript version) and publisher's PDF-version self-archiving is allowed.
  4. Archiving the pre-print (pre-refereeing manuscript version) not allowed.

Downloads

Download data is not yet available.