1 / 27

Source of Knowledge Blooming Like a Lotus

C heerfulness Morality. I ntellectual Professional. Source of Knowledge Blooming Like a Lotus. Knowledge is the competitive weapon of the 21 st century. The Analysis and Evaluation of Security Readiness in ICT Infrastructure for Supporting e-Learning in Institute of Physical Education.

ryu
Download Presentation

Source of Knowledge Blooming Like a Lotus

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cheerfulness Morality Intellectual Professional SourceofKnowledgeBloomingLike a Lotus Knowledge is the competitive weapon of the 21st century

  2. The Analysis and Evaluation of Security Readiness in ICT Infrastructure for Supporting e-Learning in Institute of Physical Education Thanakorn Meehinkong Prasong Praneetpolgrang Kittima Mekhabunchakij Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand

  3. Agenda • Background of the Research • Research Objectives • Theories and Related Research • Research Conceptual Framework • Research Methodology • Research Results • Conclusions • Suggestion 3

  4. Background of the Research • ICT Infrastructure is necessary for e-Learning • management. • ICT Infrastructure of IPE has no security readiness. • The IPE has heavily invest on ICT Infrastructure. • There are no setting security standard to maintain • security process in IPE. IPE = Institute Physical Education, ICT = Information and Communication Technology

  5. Research Objectives 1. To analyze the readiness of ICT security 2. To evaluate the security readiness of ICT infrastructure in order to supporting e-Learning in Institute of Physical Education

  6. Theories and Related Research 1. e- Learning 2. ICT Security 3. Concept of Evaluation 4. ISMS Model

  7. Theories and Related Research (Cont.) 1. e-Learning • The learners do not have to come to study • in same place and same time. • The Learners have to study the content from • e-Learning courseware, stress the content by • non-linear, designed interaction activity, • include exercises and tests for self understanding. • The content is divided in modules, learners • have to discuss and share their opinions with • their classmates through electronics.

  8. Theories and Related Research (Cont.) 2. ICT Security • ICT security is a protection of ICT asset in the • organization that refers to confidentiality, • integrity and availability. • ICT Infrastructure asset is important to protect • a computer network and Internet support in • e-Learning system.

  9. Theories and Related Research (Cont.) 2. ICT Security (Cont.) • Many organizations adopt international standard • ICT security as a main principle to develop • organization’s ICT security for confidential and • acceptance of public. • Many organization in Thailand and all over • the world emphasize in the word Best Practices • or the direction standard that prepare • organization’s ICT to IT Governance. The • popular best practices are CobiT, ITIL and • ISO/IEC 27001.

  10. Theories and Related Research (Cont.) 3.Concept of Evaluation • Shuffle Beam and et al.(1971)[8] gave meaning • of evaluation that it is a analysis process in order • to get usefulness information for making decision • the best choice. • Alkin (1969) [7] defined the word “Evaluation” • that it is a collecting information selection • process and utility IT management, present • to the person who has power in decision • making or to specific activity or project.

  11. Theories and Related Research (Cont.) 4. ISMS Model Jan Eloff and Mariki Eloff [11] presented a new form of information security management model, using ISMS model (Information Security Management System) and refer information security standard ISO17799.

  12. Research Conceptual Framework

  13. Research Methodology 1. Population and Sampling Groups 2. Research Tool 3. Data Analysis

  14. Research Methodology (Cont.) 1. Population and Sampling Groups Sampling Group Population

  15. Research Methodology (Cont.) 2. Research Tool we use the questionnaires as research tool with sending 767 questionnaires; we receive the return questionnaires with 513 papers that is only 66.88 percents

  16. Research Methodology (Cont.) 3. Data Analysis This research study, we have quantitative data from questionnaires, observation, interview and data analysis with statistical mean and standard deviation.

  17. Research Result 1. ICT Security Analysis Result. 2. Evaluation Result of Security Readiness in ICT Infrastructure from questionnaires 3. Evaluation Result of Security Readiness in ICT Infrastructure from Executive’s Interview. 4. ICT Infrastructure Effect Factor.

  18. Research Result (Cont.) 1. ICT Security Analysis Result The Level of ICT Security readiness The Level of ICT Security readiness (Cont.)

  19. Research Result (Cont.) 2. Evaluation Result of Security Readiness in ICT Infrastructure from questionnaires The Level of Security Readiness in ICT Infrastructure

  20. Research Result (Cont.) 3. Evaluation Result of Security Readiness in ICT Infrastructure from Executive’s Interview. • ICT Security Significance: Person or staff in Institute of Physical Education place importance in ICT Security • ICT Infrastructure Budget Supporting:Institute of Physical Education propose ICT model scheme year 2008-2012, the 5 strategies .

  21. Research Result (Cont.) 3. Evaluation Result of Security Readiness in ICT Infrastructure from Executive’s Interview.(Cont.) • ICT Security Actual Problem:The office has not • using control system in computer and internet • network, non- quality internet network, lack of • knowhow technical person, these go to be destroy • data by virus, loosing data, using other data which • disallow, inactive computer because of inoperative • program, slowly solving network problem.

  22. Research Result (Cont.) 4. ICT Infrastructure Effect Factor The factors that effect to ICT infrastructure are executives, people, budget and plan. • 1. Policy :The executives do not govern their people to comply • with the policy. • 2. People: The people have got less knowledge training • and discontinuous. • 3. Physical and Environment :The people are not awareness of • ICT security in office. • 4. Hardware : The budget is not enough for hardware • development plan. • 5. Software: The budget is not enough for software development plan.

  23. Conclusions • IPE has a moderate level of ICT security. • IPE has a moderate level of security readiness • in ICT infrastructure. • The results of executive interviews show that • the IPE current budget allocated to the appropriate • ICT infrastructure and focus on ICT security • significantly. IPE = Institute Physical Education , ICT = Information and Communication Technology

  24. Suggestion This research result show that security readiness in ICT infrastructure in IPE has a moderate level. This level can support e-Learning only for a basic requirement. To success in e-Learning in high level, IPE should process on ICT infrastructure as follow : 1. Policy and Structure: Redefine policy and structure control. 2. People :Provide training and inspire people awareness. 3. Physical and Environment: Set up security guards environment. 4. Hardware: Provide appropriate number of computers and effective intrusion detection system. 5. Software: Provide e-Learning software licence. IPE = Institute Physical Education , ICT = Information and Communication Technology

  25. References [1] Institute of Physical Education, Master plan Information and Communication Technology (2008-2012), Bangkok, 2008. [2] Prinya banpasat,“The design and format of e-learning concepts,” Master of information Technology in Sripratum University, Thailand, 2004. [3] International Standards for Business Government and Society, Information Security Management Requirements ISO/IEC 27001, Switzerland: ISO Office, 2007. [4] Doungkamol suppitayakorn, Standard practice guidelines and framework are related to information technology systems, Bangkok, Thai Computer Emergency Response Team, 2007. [5] itSMF, ITIl V3 Foundation Handbook, Pocketbook from Official Publisher of ITIL, Updated to the 2009 Syllabus,2009. [6] Prin sereepong, ISO 27001 Introduction to security management system, bangkok,ThailandProductivityInstitue, 2008. [7] Peerapong Manakij, “Manage Security Problems: If Event 3 Southern Border Provinces,” Research Reports, National Institute of Development Administration, 2005.

  26. References(Cont.) [8] Shuffle Beamand et.Al. (2003) nsdv homepage.[Online]. Available: http:// www. nsdv.go.th/evaluation/ [9] Stake, R.E, Standards-Based and Responsive Evaluation.  Thousand Oaks, CA: Sage Publications.2004. [10] Daniel W K Tse. “Security in Modern Business Security Assessment Model for Information Security Practices,” Proceeding of the Pacific Asia Conference of Information Systems, 2004,pp. 1506-1519. [11] Jan eloff, Mariki eloff, Information Security Management – A New Paradigm, PretoriaUniversity and University of South Africa, 2003. [12] Vannee Gamkat, Science behavioral science research methods, Printing of Chulalongkorn University 2nd, 2008, p.205-221, 287-294. [13] M.D. Aime, A. Atzeni, and P.C. Pomi, “The risks with security metrics,” Proceedings of the 4th ACM workshop on Quality of protection, 2008, pp.65–70. [14] K. Burgess, P.J. Singh, and R. Koroglu, “Supply chain management: a structured iterature review and implications for future research,” International Journal of Operations and Production Management, 2006, vol. 26, p.703. [15] B.Von Solms and R. Von Solms, “The 10 deadly sins of information security management,” Computers & Security, 2004, vol. 23, pp. 371–376.

  27. Thank you for your kind attention thanakorn_me@yahoo.com

More Related