Presentation is loading. Please wait.

Presentation is loading. Please wait.

Source of Knowledge Blooming Like a Lotus Knowledge is the competitive weapon of the 21 st century Intellectual Professional Cheerfulness Morality.

Similar presentations


Presentation on theme: "Source of Knowledge Blooming Like a Lotus Knowledge is the competitive weapon of the 21 st century Intellectual Professional Cheerfulness Morality."— Presentation transcript:

1 Source of Knowledge Blooming Like a Lotus Knowledge is the competitive weapon of the 21 st century Intellectual Professional Cheerfulness Morality

2 The Analysis and Evaluation of Security Readiness in ICT Infrastructure for Supporting e-Learning in Institute of Physical Education Thanakorn Meehinkong Prasong Praneetpolgrang Kittima Mekhabunchakij Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand

3 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University Background of the Research Research Objectives Theories and Related Research Research Conceptual Framework Research Methodology Research Results Conclusions Suggestion 3 Agenda

4 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 4 The IPE has heavily invest on ICT Infrastructure. Background of the Research ICT Infrastructure is necessary for e-Learning management. ICT Infrastructure of IPE has no security readiness. IPE = Institute Physical Education, ICT = Information and Communication Technology There are no setting security standard to maintain security process in IPE.

5 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 5 1. To analyze the readiness of ICT security 2. To evaluate the security readiness of ICT infrastructure in order to supporting e-Learning in Institute of Physical Education Research Objectives

6 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 6 Theories and Related Research 1. e- Learning 2. ICT Security 3. Concept of Evaluation 4. ISMS Model

7 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 7 Theories and Related Research (Cont.) 1. e-Learning The learners do not have to come to study in same place and same time. The Learners have to study the content from e-Learning courseware, stress the content by non-linear, designed interaction activity, include exercises and tests for self understanding. The content is divided in modules, learners have to discuss and share their opinions with their classmates through electronics.

8 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 8 Theories and Related Research (Cont.) 2. ICT Security ICT security is a protection of ICT asset in the organization that refers to confidentiality, integrity and availability. ICT Infrastructure asset is important to protect a computer network and Internet support in e-Learning system.

9 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 9 Theories and Related Research (Cont.) Many organizations adopt international standard ICT security as a main principle to develop organizations ICT security for confidential and acceptance of public. Many organization in Thailand and all over the world emphasize in the word Best Practices or the direction standard that prepare organizations ICT to IT Governance. The popular best practices are CobiT, ITIL and ISO/IEC 27001. 2. ICT Security 2. ICT Security (Cont.)

10 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 10 Theories and Related Research (Cont.) 3.Concept of Evaluation Shuffle Beam and et al.(1971)[8] gave meaning of evaluation that it is a analysis process in order to get usefulness information for making decision the best choice. Alkin (1969) [7] defined the word Evaluation that it is a collecting information selection process and utility IT management, present to the person who has power in decision making or to specific activity or project.

11 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 11 Theories and Related Research (Cont.) 4. ISMS Model Jan Eloff and Mariki Eloff [11] presented a new form of information security management model, using ISMS model (Information Security Management System) and refer information security standard ISO17799.

12 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 12 Research Conceptual Framework

13 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 13 Research Methodology 1. Population and Sampling Groups 3. Data Analysis 2. Research Tool

14 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 14 Research Methodology (Cont.) Sampling Groups Freque ncy Executives141 Administrator58 Instructor288 Office Staff280 Sub-Ordinate UnitsUnits Central Institutions1 Institute of Physical Education 17 Sports School11 Population Sampling Grou p 1. Population and Sampling Groups

15 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 15 Research Methodology (Cont.) 2. Research Tool we use the questionnaires as research tool with sending 767 questionnaires; we receive the return questionnaires with 513 papers that is only 66.88 percents

16 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 16 3. Data Analysis This research study, we have quantitative data from questionnaires, observation, interview and data analysis with statistical mean and standard deviation. Research Methodology (Cont.)

17 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 17 1. ICT Security Analysis Result. 2. Evaluation Result of Security Readiness in ICT Infrastructure from questionnaires in ICT Infrastructure from questionnaires 3. Evaluation Result of Security Readiness in ICT Infrastructure from Executives in ICT Infrastructure from Executives Interview. Interview. 4. ICT Infrastructure Effect Factor. Research Result

18 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University Dimension of Security Mean S.D. 7. Back-up2.690.90 8. Access Control 2.710.92 9. Information Systems Acquisition, Development and Maintenance 2.750.89 10. Information Security Incident Management 2.630.93 11. Compliance 2.720.95 Average 2.800.88 Dimension of Security Mean S.D. 1. Policy and Organization of Information Security 2.900.88 2. Asset Management 2.930.83 3. Human Resources Security 2.940.84 4. Physical and Environmental Security 3.000.78 5. Communications and Operations Management 2.880.89 6. Exchange of Information2.690.92 18 The Level of ICT Security readiness The Level of ICT Security readiness (Cont.) 1. ICT Security Analysis Result Research Result (Cont.)

19 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 19 Research Result (Cont.) Infrastructure ICT MeanS.D. Policy and Structure 2.830.93 People 2.870.87 Physical and Environmental 2.930.82 Hardware2.880.86 Software2.730.91 Average2.850.76 The Level of Security Readiness in ICT Infrastructure 2. Evaluation Result of Security Readiness in ICT Infrastructure from questionnaires in ICT Infrastructure from questionnaires

20 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 20 Research Result (Cont.) ICT Security Significance: Person or staff in Institute of Physical Education place importance in ICT Security ICT Infrastructure Budget Supporting: Institute of Physical Education propose ICT model scheme year 2008-2012, the 5 strategies. 3. Evaluation Result of Security Readiness in ICT Infrastructure from Executives Interview. ICT Infrastructure from Executives Interview.

21 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 21 Research Result (Cont.) ICT Security Actual Problem: The office has not using control system in computer and internet network, non- quality internet network, lack of knowhow technical person, these go to be destroy data by virus, loosing data, using other data which disallow, inactive computer because of inoperative program, slowly solving network problem. 3. Evaluation Result of Security Readiness in ICT Infrastructure from Executives in ICT Infrastructure from Executives Interview.(Cont.) Interview.(Cont.)

22 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 22 Research Result (Cont.) The factors that effect to ICT infrastructure are executives, people, budget and plan. 1. Policy : The executives do not govern their people to comply with the policy. 2. People : The people have got less knowledge training and discontinuous. 3. Physical and Environment : The people are not awareness of ICT security in office. 4. Hardware : The budget is not enough for hardware development plan. 5. Software : The budget is not enough for software development plan. 4. ICT Infrastructure Effect Factor

23 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 23 Conclusions IPE has a moderate level of ICT security. IPE has a moderate level of security readiness in ICT infrastructure. The results of executive interviews show that the IPE current budget allocated to the appropriate ICT infrastructure and focus on ICT security significantly. IPE = Institute Physical Education, ICT = Information and Communication Technology

24 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 24 1. Policy and Structure: Redefine policy and structure control. 2. People :Provide training and inspire people awareness. 3. Physical and Environment: Set up security guards environment. 4. Hardware: Provide appropriate number of computers and effective intrusion detection system. 5. Software: Provide e-Learning software licence. Suggestion This research result show that security readiness in ICT infrastructure in IPE has a moderate level. This level can support e-Learning only for a basic requirement. To success in e-Learning in high level, IPE should process on ICT infrastructure as follow : IPE = Institute Physical Education, ICT = Information and Communication Technology

25 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 25 [1] Institute of Physical Education, Master plan Information and Communication Technology (2008-2012), Bangkok, 2008. [2] Prinya banpasat,The design and format of e-learning concepts, Master of information Technology in Sripratum University, Thailand, 2004. [3] International Standards for Business Government and Society, Information Security Management Requirements ISO/IEC 27001, Switzerland: ISO Office, 2007. [4] Doungkamol suppitayakorn, Standard practice guidelines and framework are related to information technology systems, Bangkok, Thai Computer Emergency Response Team, 2007. [5] itSMF, ITIl V3 Foundation Handbook, Pocketbook from Official Publisher of ITIL, Updated to the 2009 Syllabus,2009. [6] Prin sereepong, ISO 27001 Introduction to security management system, bangkok, Thailand Productivity Institue, 2008. [7] Peerapong Manakij, Manage Security Problems: If Event 3 Southern Border Provinces, Research Reports, National Institute of Development Administration, 2005. References

26 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 26 References (Cont.) [8] Shuffle Beam and et.Al. (2003) nsdv homepage.[Online]. Available: http:// www. nsdv.go.th/evaluation/ [9] Stake, R.E, Standards-Based and Responsive Evaluation. Thousand Oaks, CA: Sage Publications.2004. [10] Daniel W K Tse. Security in Modern Business Security Assessment Model for Information Security Practices, Proceeding of the Pacific Asia Conference of Information Systems, 2004,pp. 1506-1519. [11] Jan eloff, Mariki eloff, Information Security Management – A New Paradigm, PretoriaUniversity and University of South Africa, 2003. [12] Vannee Gamkat, Science behavioral science research methods, Printing of Chulalongkorn University 2 nd, 2008, p.205-221, 287-294. [13] M.D. Aime, A. Atzeni, and P.C. Pomi, The risks with security metrics, Proceedings of the 4th ACM workshop on Quality of protection, 2008, pp.65–70. [14] K. Burgess, P.J. Singh, and R. Koroglu, Supply chain management: a structured iterature review and implications for future research, International Journal of Operations and Production Management, 2006, vol. 26, p.703. [15] B.Von Solms and R. Von Solms, The 10 deadly sins of information security management, Computers & Security, 2004, vol. 23, pp. 371–376.

27 The Sixth International Conference on eLearning for Knowledge-Based Society, 17-18 December 2009 Thailand Faculty of Informatics, Doctor of Philosophy Program in Information Technology Sripatum University, Bangkok, Thailand Sripatum University 27 Thank you for your kind attention thanakorn_me@yahoo.com


Download ppt "Source of Knowledge Blooming Like a Lotus Knowledge is the competitive weapon of the 21 st century Intellectual Professional Cheerfulness Morality."

Similar presentations


Ads by Google