In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and...In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania.展开更多
With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware...With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated.展开更多
Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constit...Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements.展开更多
In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecur...In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications.展开更多
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the serv...Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.展开更多
With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a l...With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China.展开更多
Libraries in China's higher education institutions have been developing in keeping pace with the flourishing development of China's higher education. This article aims to make an introduction to the constructi...Libraries in China's higher education institutions have been developing in keeping pace with the flourishing development of China's higher education. This article aims to make an introduction to the construction of China's higher education libraries, especially the recent three decades' achievements since China's reform and opening-up in 1978. In this article, the authors draw a general picture of the development of libraries in China's higher education institutions, covering such eight aspects as management, types and positioning,organizational structure and personnel, expenditure and buildings, reader service, building and sharing of resources as well as automation system.展开更多
Reading is the main route to impart scientific and cultural knowledge.It is not only related to personal growth,but also closely related to the construction of our society and the prosperity of the nation.University l...Reading is the main route to impart scientific and cultural knowledge.It is not only related to personal growth,but also closely related to the construction of our society and the prosperity of the nation.University libraries must take on this important responsibility and strengthen the promotion of reading.In the"Internet+"era,university libraries need to focus on how to keep up with the development of the times and provide better digital reading services for teachers and students.The author studies and analyzes the main characteristics of digital reading in university libraries,and proposes the service strategy of digital reading for university libraries in the"Internet+"era,hoping to help with the university libraries playing their roles.展开更多
Purpose:The main objective of this work is to show the potentialities of recently developed approaches for automatic knowledge extraction directly from the universities’websites.The information automatically extracte...Purpose:The main objective of this work is to show the potentialities of recently developed approaches for automatic knowledge extraction directly from the universities’websites.The information automatically extracted can be potentially updated with a frequency higher than once per year,and be safe from manipulations or misinterpretations.Moreover,this approach allows us flexibility in collecting indicators about the efficiency of universities’websites and their effectiveness in disseminating key contents.These new indicators can complement traditional indicators of scientific research(e.g.number of articles and number of citations)and teaching(e.g.number of students and graduates)by introducing further dimensions to allow new insights for“profiling”the analyzed universities.Design/methodology/approach:Webometrics relies on web mining methods and techniques to perform quantitative analyses of the web.This study implements an advanced application of the webometric approach,exploiting all the three categories of web mining:web content mining;web structure mining;web usage mining.The information to compute our indicators has been extracted from the universities’websites by using web scraping and text mining techniques.The scraped information has been stored in a NoSQL DB according to a semistructured form to allow for retrieving information efficiently by text mining techniques.This provides increased flexibility in the design of new indicators,opening the door to new types of analyses.Some data have also been collected by means of batch interrogations of search engines(Bing,www.bing.com)or from a leading provider of Web analytics(SimilarWeb,http://www.similarweb.com).The information extracted from the Web has been combined with the University structural information taken from the European Tertiary Education Register(https://eter.joanneum.at/#/home),a database collecting information on Higher Education Institutions(HEIs)at European level.All the above was used to perform a clusterization of 79 Italian universities based on structural and digital indicators.Findings:The main findings of this study concern the evaluation of the potential in digitalization of universities,in particular by presenting techniques for the automatic extraction of information from the web to build indicators of quality and impact of universities’websites.These indicators can complement traditional indicators and can be used to identify groups of universities with common features using clustering techniques working with the above indicators.Research limitations:The results reported in this study refers to Italian universities only,but the approach could be extended to other university systems abroad.Practical implications:The approach proposed in this study and its illustration on Italian universities show the usefulness of recently introduced automatic data extraction and web scraping approaches and its practical relevance for characterizing and profiling the activities of universities on the basis of their websites.The approach could be applied to other university systems.Originality/value:This work applies for the first time to university websites some recently introduced techniques for automatic knowledge extraction based on web scraping,optical character recognition and nontrivial text mining operations(Bruni&Bianchi,2020).展开更多
As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurit...As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.展开更多
Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective pa...Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997.展开更多
All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from har...All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy.展开更多
文摘In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania.
文摘With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated.
文摘Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements.
文摘In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.
文摘With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China.
基金supported by the National Planning Office of Philosophy and Social Science(Grant No.04BTQ002)
文摘Libraries in China's higher education institutions have been developing in keeping pace with the flourishing development of China's higher education. This article aims to make an introduction to the construction of China's higher education libraries, especially the recent three decades' achievements since China's reform and opening-up in 1978. In this article, the authors draw a general picture of the development of libraries in China's higher education institutions, covering such eight aspects as management, types and positioning,organizational structure and personnel, expenditure and buildings, reader service, building and sharing of resources as well as automation system.
文摘Reading is the main route to impart scientific and cultural knowledge.It is not only related to personal growth,but also closely related to the construction of our society and the prosperity of the nation.University libraries must take on this important responsibility and strengthen the promotion of reading.In the"Internet+"era,university libraries need to focus on how to keep up with the development of the times and provide better digital reading services for teachers and students.The author studies and analyzes the main characteristics of digital reading in university libraries,and proposes the service strategy of digital reading for university libraries in the"Internet+"era,hoping to help with the university libraries playing their roles.
基金This work is developed with the support of the H2020 RISIS 2 Project(No.824091)and of the“Sapienza”Research Awards No.RM1161550376E40E of 2016 and RM11916B8853C925 of 2019.This article is a largely extended version of Bianchi et al.(2019)presented at the ISSI 2019 Conference held in Rome,2–5 September 2019.
文摘Purpose:The main objective of this work is to show the potentialities of recently developed approaches for automatic knowledge extraction directly from the universities’websites.The information automatically extracted can be potentially updated with a frequency higher than once per year,and be safe from manipulations or misinterpretations.Moreover,this approach allows us flexibility in collecting indicators about the efficiency of universities’websites and their effectiveness in disseminating key contents.These new indicators can complement traditional indicators of scientific research(e.g.number of articles and number of citations)and teaching(e.g.number of students and graduates)by introducing further dimensions to allow new insights for“profiling”the analyzed universities.Design/methodology/approach:Webometrics relies on web mining methods and techniques to perform quantitative analyses of the web.This study implements an advanced application of the webometric approach,exploiting all the three categories of web mining:web content mining;web structure mining;web usage mining.The information to compute our indicators has been extracted from the universities’websites by using web scraping and text mining techniques.The scraped information has been stored in a NoSQL DB according to a semistructured form to allow for retrieving information efficiently by text mining techniques.This provides increased flexibility in the design of new indicators,opening the door to new types of analyses.Some data have also been collected by means of batch interrogations of search engines(Bing,www.bing.com)or from a leading provider of Web analytics(SimilarWeb,http://www.similarweb.com).The information extracted from the Web has been combined with the University structural information taken from the European Tertiary Education Register(https://eter.joanneum.at/#/home),a database collecting information on Higher Education Institutions(HEIs)at European level.All the above was used to perform a clusterization of 79 Italian universities based on structural and digital indicators.Findings:The main findings of this study concern the evaluation of the potential in digitalization of universities,in particular by presenting techniques for the automatic extraction of information from the web to build indicators of quality and impact of universities’websites.These indicators can complement traditional indicators and can be used to identify groups of universities with common features using clustering techniques working with the above indicators.Research limitations:The results reported in this study refers to Italian universities only,but the approach could be extended to other university systems abroad.Practical implications:The approach proposed in this study and its illustration on Italian universities show the usefulness of recently introduced automatic data extraction and web scraping approaches and its practical relevance for characterizing and profiling the activities of universities on the basis of their websites.The approach could be applied to other university systems.Originality/value:This work applies for the first time to university websites some recently introduced techniques for automatic knowledge extraction based on web scraping,optical character recognition and nontrivial text mining operations(Bruni&Bianchi,2020).
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997.
文摘All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy.