Improving Humanitarian Relief Information and Communication Systems through Research

Author(s):  
Alexandra Bartell ◽  
Steve Lappenbusch ◽  
Randall Kemp ◽  
Mark Haselkorn
Author(s):  
С.А. БАГРЕЦОВ ◽  
Э.А. БУДАРИН ◽  
О.С. ЛАУТА ◽  
М.В. МИТРОФАНОВ

Сетевой трафик, проходящий через современные вычислительные системы, представляет собой огромный информационный поток, который содержит сведения различной степени важности. Показана необходимость использования наиболее рациональных приемов повышения устойчивости сети в радиоэлектронной борьбе, чтобы заставить противника затрачивать больше времени на подбор новых принципов воздействия на системы связи. Network traffic passing through modern computing systems is a huge information flow, which contains information of varying degrees of importance. It is shown the necessity of using the most rational methods of increasing the stability of the network in electronic warfare to force the enemy to spend more time on selecting new principles of influence on communication systems.


Author(s):  
Ksenia Katrichenko ◽  
◽  
Svitlana Kryvuts ◽  
Olena Vasina ◽  
◽  
...  

The article is devoted to the analysis of means of formation of information and communication systems taking into account inclusive design. The constant development of innovative project developments in this direction indicates a change in conceptual approaches to their design and the urgency of changing the paradigm of inclusive education, which takes into account accessibility and safety for all students without exception. The system approach allowed to establish connections between the ergonomic component of the formation of the design of information and communication systems, their functionality and aesthetic expressiveness. The method of abstraction helped separate from certain properties and relations of the object and at the same time focus on those properties that are the direct object of scientific research; the method of generalization contributed to the logical completion of abstraction; the method of classification allowed to determine the specific characteristics in solving the problems of the best examples of project activities with the possibility of their theoretical justification. The social significance and relevance of the chosen research topic lies in the analysis and identification of fundamentally new design solutions for the educational space of secondary schools, which have been implemented in foreign countries. Characteristic features of their solution are taking into account the principles of universal (inclusive) design based on the use of technological innovations, availability of spatial planning, design and artistic solutions, which significantly improve the implementation of information and communication systems. Functional comfort, in this case, is considered as a generalized criterion for optimizing the system "human-object or process-environment". In addition, the inclusive approach takes into account the comfortable and aesthetic conditions of students' adaptation to the new modern standards of education and testifies to its practical significance. It is a special synthesis of ergonomics and design in the educational environment, and also allows you to create new "scenarios" of educational activities of modern students. Analysis of aspects of the developed design model of an inclusive approach in solving information and communication systems will help initiate its implementation in the educational space of secondary schools of Ukraine.


Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


Sign in / Sign up

Export Citation Format

Share Document