COUNTERING CYBER THREATS IN THE CONTEXT OF DIGITAL EDUCATIONAL TECHNOLOGIES IN THE HIGHER EDUCATION SYSTEM OF UKRAINE
Abstract
The article is dedicated to analyzing the implementation of distance learning in higher education institutions in Ukraine, as well as the challenges and prospects associated with this process. It discusses the main distance learning platforms used in Ukrainian higher education institutions such as Moodle, Google Classroom, Microsoft Teams, Coursera, EdX, Prometheus, and the National Distance Learning Platform. Each of these platforms has its own features and advantages, ensuring accessibility and flexibility in education for students and educators. In addition to the advantages of distance learning, the article also focuses on cybersecurity issues, which are becoming increasingly relevant with the growth of online education. The main cybersecurity threats are analyzed, including software vulnerabilities, personal data protection, network security, and the low level of user awareness. Approaches to managing innovations for protection against cybercrime and stimulating investments in cybersecurity are discussed, highlighting their effects on educational institutions, the country, and society. The article highlights ways to enhance cybersecurity in HEIs, including implementing modern security technologies, developing strict data access policies, and increasing cyber literacy among students and faculty. The legislative framework of Ukraine regulating data and information protection is also discussed, with particular attention to the laws «On Personal Data Protection» and «On Information Protection in Information and Telecommunication Systems,» as well as recent changes in copyright legislation emphasizing the protection of intellectual property in the digital environment. The article concludes that distance learning in Ukraine has great potential but requires improvements in cybersecurity and updates to legislation for the digital age. The implementation of cybersecurity measures and the modernization of the regulatory framework will help create a safe and effective learning environment.
References
2. Desamsetti, H. (2016). Issues with the cloud computing technology. International Research Journal of Engineering and Technology (IRJET), 3(5), 321–323.
3. Reghunadhan, R. (2022). History and Evolution of Global Cyber Technological Threat Landscape: Theoretical Dimensions. Cyber Technological Paradigms and Threat Landscapein India, 1, 21–55.
4. Tytarchuk, M. (2020). Rozvytok dystantsiynoho navchannya za kordonom ta v Ukrayini [Development of Distance Learning Abroad and in Ukraine]. Dystantsiyna osvita v Ukrayini: innovatsiyni, normatyvno-pravovi, pedahohichni aspekty: zb. nauk. prats materialiv I Vseukrayinskoyi naukovo-praktychnoi konferentsiyi, 1, 129-130. doi: http://iro.nau.edu.ua/images/docs/conference/conf_distance/16.06.2020/%D0%97%D0%B1%D1%96%D1%80%D0%BA%D0%B0%20%D1%82%D0%B5%D0%B7_%D0%94%D0%B8%D1%81%D1%82%D0%B0%D0%BD%D1%86%D1%96%D0%B9%D0%BD%D0%B0%20%D0%BE%D1%81%D0%B2%D1%96%D1%82%D0%B0_2020.pdf.
5. Dudnik, V., Tukhatarova, T., & Kuchер, R. (2020). Dystantsiynе navchannya zdobuvachiv osvitу Ukrayiny v umovakh voyennogo stanu: orhanizatsiynyy aspekt [Distance Learning for Ukrainian Students in Wartime Conditions: Organizational Aspect]. Visnyk Dniprovskoyi akademiyi neperyvnoї osvity. Seriya: Fіlosofiya. Pedahohika, 2 (3), 54-60. doi: http://nbuv.gov.ua/UJRN/dnipakmo_2022_2_10.
6. Fadziso, T., Thaduri, R. U., & Desamsetti, H. (2023). Evolution of the Cybersecurity Threat: An Overview of the Scale of Cyber Threat. Digitalization & Sustainability Review, 3(1), 1–12.
7. Nashynets-Naumova, A., Buriachok, V., Korshun N., Zhyltsov, J., Skladannyi P., & Kuzmenko, L. (2020). Technology for information and cybersecurity in higher education institutions of Ukraine. ITLT, 77(3), 337–354. doi: 10.33407/itlt.v77i3.3424.
8. Kuzmenko, O., Kubálek, L., Bozhenko, V., Kushneryov, O., & Vida, I. (2021). An approach to managing innovation to protect financial sector against cybercrime, Polish Journal of Management Studies, 24, 276–291. doi: https://doi.org/10.17512/pjms.2021.24.2.17.
9. Yang, A., Kwon, Y. J., & Lee, S. T. (2020). The impact of information sharing legislation on cybersecurity industry. Industrial Management & Data Systems, 120(9), 1777–1794. https://doi.org/10.1108/imds-10-2019-0536
10. Wessels, M., Van Den Brink, P., Verburgh, T., Cadet, B., & Van Ruijven, T. (2021). Understanding incentives for cybersecurity investments: Development and application of a typology. Digital Business, 1(2), 100014. https://doi.org/10.1016/j.digbus.2021.100014
11. Moodle – Advantages and Disadvantages | BeamStacks Blog. BeamStacks Blog. (n.d.). https://www.beamstacks.com/blog/moodle-advantages-and-disadvantages-learning-system/
12. Google Classroom – Pros and Cons. Google Sites: Sign-in. (n.d.). https://sites.google.com/view/classroom-workspace/new/pros-and-cons. Data zvernennya: Cherv. 19, 2024.
13. Raymond, D. (2023, December 28). Top 10 Cons or Disadvantages of Microsoft Teams. Project-Managers.net. https://projectmanagers.net/top-10-cons-or-disadvantages-of-microsoft-teams/
14. Tamm, S. (2023, November 22). An honest review of Coursera in 2023: pros, cons & alternatives. E-Student. https://e-student.org/coursera-review/
15. Review of Coursera, EdX, and Udacity: What’s good and what’s bad. (n.d.). https://www.edukatico.org/en/report/review-of-coursera-edx-and-udacity-what-s-good-andwhat-s-bad
16. Prometheus. Let’s learn. (n.d.). https://vchymo.com/application/Prometheus.
17. Shapoval, O., Kotlyaria, S., Medvedieva, A., Lishafai O., Barabash, O., & Oleksyuk, O. (2021). Education in Cyberspace: University as Universality. International Journal of Computer Science and Network Security, 21(11), 333–337. doi: http://paper.ijcsns.org/07_book/202111/20211145.pdf
18. Kavak, H., Padilla, J. J., Vernon-Bido, D., Diallo, S. Y., Gore, R., & Shetty, S. (2021). Simulation for cybersecurity: state of the art and future directions. Journal of Cybersecurity, 7(1). https://doi.org/10.1093/cybsec/tyab005
19. Gunduz, M. Z., & Das, R. (2020). Cyber-security on smart grid: Threats and potential solutions. Computer Networks, 169, 107094. https://doi.org/10.1016/j.comnet.2019.107094
20. Guembe, B., Azeta, A., Misra, S., Osamor, V. C., Fernandez-Sanz, L., & Pospelova, V. (2022). The emerging threat of AI-driven cyber attacks: a review. Applied Artificial Intelligence, 36(1). https://doi.org/10.1080/08839514.2022.2037254
21. Hina, S., & Dominic, P. (2020). Information security policies’ compliance: A perspective for higher education institutions. Journal of Computer Information Systems, 60(3), 201–211.
Abstract views: 16 PDF Downloads: 11