In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and...In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania.展开更多
along with the implementation of national intellectual property strategy and the construction of an innovative country, institutions of higher learning pay more and more attention to patent. By elaborating the roles o...along with the implementation of national intellectual property strategy and the construction of an innovative country, institutions of higher learning pay more and more attention to patent. By elaborating the roles of patent protection management from five aspects and sunmarizing Sichuan Agricultural University' s status quo of patent management, patent policies and patent licensing in recent years, this paper discusses four problems existing in universities ' patent protection management and proposes corresponding countermeasures.展开更多
With the deepening of China's reform and opening up, China's private higher education has got rapid development. The expanding of the scale and the updating of the educational philosophy makes the financial manageme...With the deepening of China's reform and opening up, China's private higher education has got rapid development. The expanding of the scale and the updating of the educational philosophy makes the financial management of private higher learning institutions can't meet the developing needs of them. Through summing up the current defects existed in the financial management activities of the private higher learning institutions, this paper tries to advise the private higher learning institutions to set out their efforts on financial management foundation, financing management, investment management, budget management, financial analysis and financial supervision six aspects, standardize and optimize the financial management activities to promote the healthy development of China's private higher learning institutions.展开更多
This paper adopts the research methods such as literature material method, questionnaire investigation method, expert interview method and mathematical statistics to investigate and study the conditions of fancy rope ...This paper adopts the research methods such as literature material method, questionnaire investigation method, expert interview method and mathematical statistics to investigate and study the conditions of fancy rope skipping curriculum in 22 universities in Sichuan. The research shows that the university teachers highly recognize the fancy rope skipping curriculum; construction of teaching resources should be strengthened; cultivation of the professional teaching staffs should be strengthened; in terms of teaching materials, more premium teaching materials with high pertinence and professionalism are needed; the promotion and implementation of the curriculum system of fancy rope skipping should be boosted in different steps and stages; cultivation of the professional teachers should be enlarged; related scientific research of the curriculum system of fancy rope skipping should be strengthened.展开更多
The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the...The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the healthy growth and comprehensive development of the art majors. In this paper, the ideological education and managemenl model for the art majors in institutions of higher learning in the new oeriod are studied, hooing to attract more scholars to focus on this tooic.展开更多
With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware...With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated.展开更多
Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constit...Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements.展开更多
In different historical periods, the institutions of higher learning are endowed with dltlerent social tunctlons, wnlcn also experience some changes with the social development.The addition of cultural inheritance and...In different historical periods, the institutions of higher learning are endowed with dltlerent social tunctlons, wnlcn also experience some changes with the social development.The addition of cultural inheritance and innovation function, makes the institutions of higher learning must assume their obligations in accounting integrity construction.This article, through interpreting the essence and significance of accounting integrity, further expound the functions and integrity construction. responsibilities of the institutions of higher learning in accounting展开更多
With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a l...With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China.展开更多
with the vigorous development of education, the requirement to the higher education, especially to the improving college students’ physical quality, should be higher and strict in the new stage. In the improvement of...with the vigorous development of education, the requirement to the higher education, especially to the improving college students’ physical quality, should be higher and strict in the new stage. In the improvement of Sunshine Sports background, the institutes of higher learning began to spread Tai Chi widely, inheriting Chinese traditional culture and in the meanwhile, to improve students’ physical quality and healthy. However, according to their cognitive level and participation of Tai Chi, the limits still wide, which need a further improvement. Thus, this article will do analysis on the cognitive level and participation of Tai Chi in the institutes of higher learning, the main target people is these students. According to the reality, through various analysis method and calibration, we investigate the cognitive level and participation of Tai Chi in the higher education learners and confirm the defects and deficiency within. From this, we can see that cognitive level is not that high, and their participation is not enough, and the positivity to it is not so active. In a word, the wide and deep spread of Tai Chi will help their physical and metal both healthy,firming a base for the future.展开更多
In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecur...In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications.展开更多
As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurit...As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.展开更多
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the serv...Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.展开更多
Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective pa...Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997.展开更多
Purpose:The main objective of this work is to show the potentialities of recently developed approaches for automatic knowledge extraction directly from the universities’websites.The information automatically extracte...Purpose:The main objective of this work is to show the potentialities of recently developed approaches for automatic knowledge extraction directly from the universities’websites.The information automatically extracted can be potentially updated with a frequency higher than once per year,and be safe from manipulations or misinterpretations.Moreover,this approach allows us flexibility in collecting indicators about the efficiency of universities’websites and their effectiveness in disseminating key contents.These new indicators can complement traditional indicators of scientific research(e.g.number of articles and number of citations)and teaching(e.g.number of students and graduates)by introducing further dimensions to allow new insights for“profiling”the analyzed universities.Design/methodology/approach:Webometrics relies on web mining methods and techniques to perform quantitative analyses of the web.This study implements an advanced application of the webometric approach,exploiting all the three categories of web mining:web content mining;web structure mining;web usage mining.The information to compute our indicators has been extracted from the universities’websites by using web scraping and text mining techniques.The scraped information has been stored in a NoSQL DB according to a semistructured form to allow for retrieving information efficiently by text mining techniques.This provides increased flexibility in the design of new indicators,opening the door to new types of analyses.Some data have also been collected by means of batch interrogations of search engines(Bing,www.bing.com)or from a leading provider of Web analytics(SimilarWeb,http://www.similarweb.com).The information extracted from the Web has been combined with the University structural information taken from the European Tertiary Education Register(https://eter.joanneum.at/#/home),a database collecting information on Higher Education Institutions(HEIs)at European level.All the above was used to perform a clusterization of 79 Italian universities based on structural and digital indicators.Findings:The main findings of this study concern the evaluation of the potential in digitalization of universities,in particular by presenting techniques for the automatic extraction of information from the web to build indicators of quality and impact of universities’websites.These indicators can complement traditional indicators and can be used to identify groups of universities with common features using clustering techniques working with the above indicators.Research limitations:The results reported in this study refers to Italian universities only,but the approach could be extended to other university systems abroad.Practical implications:The approach proposed in this study and its illustration on Italian universities show the usefulness of recently introduced automatic data extraction and web scraping approaches and its practical relevance for characterizing and profiling the activities of universities on the basis of their websites.The approach could be applied to other university systems.Originality/value:This work applies for the first time to university websites some recently introduced techniques for automatic knowledge extraction based on web scraping,optical character recognition and nontrivial text mining operations(Bruni&Bianchi,2020).展开更多
All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from har...All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy.展开更多
文摘In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania.
文摘along with the implementation of national intellectual property strategy and the construction of an innovative country, institutions of higher learning pay more and more attention to patent. By elaborating the roles of patent protection management from five aspects and sunmarizing Sichuan Agricultural University' s status quo of patent management, patent policies and patent licensing in recent years, this paper discusses four problems existing in universities ' patent protection management and proposes corresponding countermeasures.
文摘With the deepening of China's reform and opening up, China's private higher education has got rapid development. The expanding of the scale and the updating of the educational philosophy makes the financial management of private higher learning institutions can't meet the developing needs of them. Through summing up the current defects existed in the financial management activities of the private higher learning institutions, this paper tries to advise the private higher learning institutions to set out their efforts on financial management foundation, financing management, investment management, budget management, financial analysis and financial supervision six aspects, standardize and optimize the financial management activities to promote the healthy development of China's private higher learning institutions.
文摘This paper adopts the research methods such as literature material method, questionnaire investigation method, expert interview method and mathematical statistics to investigate and study the conditions of fancy rope skipping curriculum in 22 universities in Sichuan. The research shows that the university teachers highly recognize the fancy rope skipping curriculum; construction of teaching resources should be strengthened; cultivation of the professional teaching staffs should be strengthened; in terms of teaching materials, more premium teaching materials with high pertinence and professionalism are needed; the promotion and implementation of the curriculum system of fancy rope skipping should be boosted in different steps and stages; cultivation of the professional teachers should be enlarged; related scientific research of the curriculum system of fancy rope skipping should be strengthened.
文摘The ideological situation of the art majors in institutions, of higher learning has its own characteristics and needs educators to adopt the targeted ideological education and management measures, so as to promote the healthy growth and comprehensive development of the art majors. In this paper, the ideological education and managemenl model for the art majors in institutions of higher learning in the new oeriod are studied, hooing to attract more scholars to focus on this tooic.
文摘With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated.
文摘Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements.
文摘In different historical periods, the institutions of higher learning are endowed with dltlerent social tunctlons, wnlcn also experience some changes with the social development.The addition of cultural inheritance and innovation function, makes the institutions of higher learning must assume their obligations in accounting integrity construction.This article, through interpreting the essence and significance of accounting integrity, further expound the functions and integrity construction. responsibilities of the institutions of higher learning in accounting
文摘With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China.
文摘with the vigorous development of education, the requirement to the higher education, especially to the improving college students’ physical quality, should be higher and strict in the new stage. In the improvement of Sunshine Sports background, the institutes of higher learning began to spread Tai Chi widely, inheriting Chinese traditional culture and in the meanwhile, to improve students’ physical quality and healthy. However, according to their cognitive level and participation of Tai Chi, the limits still wide, which need a further improvement. Thus, this article will do analysis on the cognitive level and participation of Tai Chi in the institutes of higher learning, the main target people is these students. According to the reality, through various analysis method and calibration, we investigate the cognitive level and participation of Tai Chi in the higher education learners and confirm the defects and deficiency within. From this, we can see that cognitive level is not that high, and their participation is not enough, and the positivity to it is not so active. In a word, the wide and deep spread of Tai Chi will help their physical and metal both healthy,firming a base for the future.
文摘In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997.
基金This work is developed with the support of the H2020 RISIS 2 Project(No.824091)and of the“Sapienza”Research Awards No.RM1161550376E40E of 2016 and RM11916B8853C925 of 2019.This article is a largely extended version of Bianchi et al.(2019)presented at the ISSI 2019 Conference held in Rome,2–5 September 2019.
文摘Purpose:The main objective of this work is to show the potentialities of recently developed approaches for automatic knowledge extraction directly from the universities’websites.The information automatically extracted can be potentially updated with a frequency higher than once per year,and be safe from manipulations or misinterpretations.Moreover,this approach allows us flexibility in collecting indicators about the efficiency of universities’websites and their effectiveness in disseminating key contents.These new indicators can complement traditional indicators of scientific research(e.g.number of articles and number of citations)and teaching(e.g.number of students and graduates)by introducing further dimensions to allow new insights for“profiling”the analyzed universities.Design/methodology/approach:Webometrics relies on web mining methods and techniques to perform quantitative analyses of the web.This study implements an advanced application of the webometric approach,exploiting all the three categories of web mining:web content mining;web structure mining;web usage mining.The information to compute our indicators has been extracted from the universities’websites by using web scraping and text mining techniques.The scraped information has been stored in a NoSQL DB according to a semistructured form to allow for retrieving information efficiently by text mining techniques.This provides increased flexibility in the design of new indicators,opening the door to new types of analyses.Some data have also been collected by means of batch interrogations of search engines(Bing,www.bing.com)or from a leading provider of Web analytics(SimilarWeb,http://www.similarweb.com).The information extracted from the Web has been combined with the University structural information taken from the European Tertiary Education Register(https://eter.joanneum.at/#/home),a database collecting information on Higher Education Institutions(HEIs)at European level.All the above was used to perform a clusterization of 79 Italian universities based on structural and digital indicators.Findings:The main findings of this study concern the evaluation of the potential in digitalization of universities,in particular by presenting techniques for the automatic extraction of information from the web to build indicators of quality and impact of universities’websites.These indicators can complement traditional indicators and can be used to identify groups of universities with common features using clustering techniques working with the above indicators.Research limitations:The results reported in this study refers to Italian universities only,but the approach could be extended to other university systems abroad.Practical implications:The approach proposed in this study and its illustration on Italian universities show the usefulness of recently introduced automatic data extraction and web scraping approaches and its practical relevance for characterizing and profiling the activities of universities on the basis of their websites.The approach could be applied to other university systems.Originality/value:This work applies for the first time to university websites some recently introduced techniques for automatic knowledge extraction based on web scraping,optical character recognition and nontrivial text mining operations(Bruni&Bianchi,2020).
文摘All modern computer users need to be concerned about information system security (individuals and organisations). Many businesses established various security structures to protect information system security from harmful occurrences by implementing security procedures, processes, policies, and information system security organisational structures to ensure data security. Despite all the precautions, information security remains a disaster in Tanzania’s learning institutions. The fundamental issue appears to be a lack of awareness of crucial information security factors. Various companies have different security issues due to differences in ICT infrastructure, implementations, and usage. The study focuses on identifying information system security threats and vulnerabilities in public higher learning institutions in Tanzania, particularly the Institute of Accountancy Arusha (IAA). The study involved all employees of IAA, academics, and other supporting staff, which totalled 302, and the sample size was 170. The study utilised a descriptive research design, where the quantitative methodology was used through a five-point Likert scale questionnaire, and found that key factors that affect the security of information systems at IAA include human factors, policy-related issues, work environment and demographic factors. The study proposed regular awareness and training programs;an increase in women’s awareness of information system security;proper policy creation and reviews every 4 years;promote actions that lessen information system security threats and vulnerabilities, and the creation of information system security policy documents independently from ICT policy.