TITLE

Determining Educational Needs of Human Force in Dar al-Hadith Qom Institute in Line with Information Security Management

AUTHOR(S)
Moein, Ali Sadeghi; Tabibi, Seyed Jamaledin; Gohari, Mahmood Reza; Ghaffari, Farhad
PUB. DATE
May 2014
SOURCE
Journal of Applied Sciences Research;2014, Vol. 10 Issue Special, p510
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Heterogeneity of participants from different aspects is one of the problems faced by organizers of educational courses in the field of information security for staff as well as managers who would like to manage their information security. This heterogeneity leads to an improper identification of educational needs which in turn causes the output of the course to be of undesirable quality. This research is aimed at the determination of educational needs of Dar al-Hadith Institute staff in Qom, Iran in the field of information security based on context information such as age, type of education, level of education and length of their service. An electronic questionnaire was used to collect information and non-hierarchical clustering procedure in SPSS software was applied to analyze data obtained from 123 trainees. At the end of the course, it was revealed that university staff and research center staff had different educational needs in some cases that could be justified by context information. In general, participants were divided into two clusters. Then the number of members in each cluster was defined along with their level of interest and their need for any item in the curricula.
ACCESSION #
96976822

 

Related Articles

  • Ãœniversite Öğrencilerinin Güvenli Bilgi ve Ä°letiÅŸim Teknolojisi Kullanım Davranışları ve Bilgi GüvenliÄŸi EÄŸitimine Genel Bir Bakış. YILMAZ, Gizem KARAOĞLAN; YILMAZ, Ramazan; SEZER, Barış // Bartin University Journal of Faculty of Education;Summer2014, Vol. 3 Issue 1, p176 

    Information and communication technologies (ICT) provide many benefits to the individual and social life whereas they can also bring about some unwanted problems as a result of their unsafe use. Educators and the education system itself have responsibilities for the students' safe use of ICT....

  • Editor's Message.  // Journal of Information Systems Education;Winter2016, Vol. 27 Issue 1, p5 

    An introduction is presented in which the editor discusses various reports within the issue on topics including programming language, an online laboratory for teaching information security, and curriculum design.

  • Ethical Implications to Hack & Issues in Information Security. Suryawanshi, Vaishali; Mavkar, Reshma; Yadav, Kranti // Advances in Computational Sciences & Technology;2012, Vol. 5 Issue 2, p457 

    Teaching "hacking" as a legitimate means how to protect a future employer's data assets has been introduced into courses with increasing frequency. The introduction of "red teaming" and attack-based exercises into information security courses presents a potential ethical problem. This paper...

  • Requirement Volatility, Standardization and Knowledge Integration in Software Projects: An Empirical Analysis on Outsourced IS Development Projects. Govindaraju, Rajesri; Bramagara, Angra; Gondodiwiryo, Leksananto; Simatupang, Tota // Journal of ICT Research & Applications;Apr2015, Vol. 9 Issue 1, p68 

    Information systems development (ISD) projects are highly complex, with different groups of people having to collaborate and exchange their knowledge. Considering the intensity of knowledge exchange that takes place in outsourced ISD projects, in this study a conceptual model was developed,...

  • The Use of New Technologies for the Collection of Statistical Information in Romania. Mihaela, Liliana; Irina, Alina; Marian, Valentin // European Journal of Interdisciplinary Studies;2013, Vol. 5 Issue 1, p1 

    Web based information collection becomes important for statistical analysis, because of the offered advantages and by the information technology progress. The paper analyzes web based information collection organization and implementation at national level and discusses the validity by using...

  • Improved Anonymization Algorithms for Hiding Sensitive Information in Hybrid Information System. A., Geetha Mary; Acharjya, D. P.; Iyengar, N. Ch. S. N. // International Journal of Computer Network & Information Security;May2014, Vol. 6 Issue 6, p9 

    In this modern era of computing, information technology revolution has brought drastic changes in the way data are collected for knowledge mining. The data thus collected are of value when it provides relevant knowledge pertaining to the interest of an organization. Therefore, the real challenge...

  • Efficient microaggregation techniques for large numerical data volumes. Solé, Marc; Muntés-Mulero, Victor; Nin, Jordi // International Journal of Information Security;Aug2012, Vol. 11 Issue 4, p253 

    The contradictory requirements of data privacy and data analysis have fostered the development of statistical disclosure control techniques. In this context, microaggregation is one of the most frequently used methods since it offers a good trade-off between simplicity and quality....

  • The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness. Shih-Chieh Hsu, Jack; Sheng-Pao Shih; Yu Wen Hung; Lowry, Paul Benjamin // Information Systems Research;Jun2015, Vol. 26 Issue 2, preceding p282 

    Although most behavioral security studies focus on organizational in-role behaviors such as information security policy (ISP) compliance, the role of organizational extra-role behaviors—security behaviors that benefit organizations but are not specified in ISPs—has long been...

  • NOTHING TO FEAR. Anson, Susan // ReNew Canada;Nov/Dec2014, Vol. 10 Issue 6, p38 

    The article discusses the advantage of data analization in public facilities wherein building information gave the staff the ability to make decisions for the economic opportunities in Canada. It highlights the benefits of gathering data for the monetary expenditure and return on investment...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics