International Journal of Modern Education and Computer Science (IJMECS)

IJMECS Vol. 13, No. 6, Dec. 2021

Cover page and Table of Contents: PDF (size: 602KB)

Table Of Contents

REGULAR PAPERS

Peculiarities of Manifestation of Student Youth' Roles and Positions in the Cyberbullying Process

By Liubov Pomytkina Yuliia Podkopaieva Kateryna Hordiienko

DOI: https://doi.org/10.5815/ijmecs.2021.06.01, Pub. Date: 8 Dec. 2021

To date, with the spread of the global pandemic, more and more student youth are involved in learning and living in cyberspace. Isolation and self-isolation contribute to the transfer of communication to cyberspace, which leads to more young people being in online space. However, as the authors point out, along with the intensification of communications, there are also destructive manifestations of behavior in the Internet space, which include cyberbullying. Cyberbullying is a systematic manifestation of destructive behavior, which contains a socio-role structure, where the initiator or group of bullies are morally and psychologically bullying in order to harm the victim, using information and communication tools. The growth of cyberbullying among student youth leads to demotivation in educational activities, low self-esteem, and even to post-traumatic stress disorder, etc. This encourages scientists, psychologists and teachers to study this phenomenon more deeply to understand its nature, causes, possible psychological diagnosis and, further, to create tools for psychoprophylaxis and psychocorrection, which aims to help the younger generation develop harmoniously as personalities, as well as future professionals. To date, the holistic method of diagnosing the manifestations of cyberbullying and uncertain features of its impact on student youth is insufficiently developed in psychology. The proposed study will expand knowledge about the means of detecting psychological violence in social networks in terms of professional training and personal development of students, which has theoretical and practical significance in psychological and pedagogical activity. The article highlights the results of the study of cyberbullying manifestations among student youth, which are due to the factors of the negative impact of information and communication technologies on the process of their formation in the digital space. The aim of the article was to identify the features of the manifestation of cyberbullying and its impact on student youth. Methods of empirical research: to detect cyberbullying among students, the method to identify roles and positions held by young people (author Norkina O.; modification of Podkopaieva Y., Hordiienko K.), method "Determination of self-esteem level" (author Kovalev S.), individual interviews, questionnaires were used. Within the survey method, the questionnaire of Makarova O. "Psychological features of cyberbullying as a form of Internet crime" (modified by K. Hordiienko) was used. To process and interpret the measurement results by comparing primary self-assessment statistic data from different groups, namely cyberbullies, assistants, defenders, victims and witnesses, the percentages of obtained data, descriptive statistics and the Kolmogorov-Smirnov criterion for one sample using IBM SPSS Statistics Base 22.0 were used. Based on the obtained results and their comparison, tables and figures of data to be analyzed were constructed. Results: the motives for the use of social networks by students are clarified; the roles and dominant types of student positions during cyberbullying are specified; the peculiarities of the response of young people to cyberbullying in social networks are determined; the correspondence between the roles and positions occupied by students during cyberbullying and their self-esteem is established. Empirically, new data on cyberbullying among students have been obtained, which will provide an impetus for the development of methods of prevention and psychocorrection of Internet violence among students of higher education institutions and improvement of knowledge and understanding in the field of cyberpsychology. The quality of the research is the new results about cyberbullying, its features, manifestations, roles and their relationship with self-esteem, which expands understanding and concretizes the problem among students, and thus gives an understanding of how to deal with this negative phenomenon.

[...] Read more.
Comparative Analysis of Performance Run Length (RLE) Data Compression Design by VHDL and Design by Microcontroller

By Marvin Chandra Wijaya

DOI: https://doi.org/10.5815/ijmecs.2021.06.02, Pub. Date: 8 Dec. 2021

Compression is a way to compress data to produce a file with a size smaller than its original size. Compression techniques can be performed on text data or binary, image (JPEG, PNG, ....), Audio (MP3, AAC, RMA, WMA, ... ..) and video (MPEG, H261, H263, ....). Compression Data is a way to process information using bits or other information units lower than the representation of data that is not encoded with a particular encoding system.
Data compression has a function to condense, shrink data to its size becomes smaller. With the smaller size of storage space required then less to make it a more efficient storing process, but it also can shorten the time of the data exchange.
Data compression using the run-length encoding (RLE) is a technique used to compress the data contains recurring characters. Run-length encoding (RLE) is a very simple form of data. In RLE running data (sequence data value is the same with many of the data elements in a row) is stored as the value of a single data and calculated the length of the data. This method is useful for data that contains a lot of data, such as simple graphic images (icons, line drawings, and animation). Data compression can be realized in various ways. Data compression can be designed using the VHDL language and can also use a microcontroller. Every realization of data compression has different performances. In this research, the performance was analyzed at the speed of compression. From the experiments conducted, the results of compression speed using VHDL implementation are 6.95 KB / s and microcontroller implementation is 5.34 KB/s. Based on the experimental results from the implementation of data compression using VHDL proposed in this study has a speed of 30.11% better.

[...] Read more.
Bond Graph Modelling of a Rotary Inverted Pendulum on a Wheeled Cart

By Jessica A. Onwuzuruike Suleiman U. Hussein

DOI: https://doi.org/10.5815/ijmecs.2021.06.03, Pub. Date: 8 Dec. 2021

There are some systems that are yet to be modelled using certain methods. One of them is Rotary Inverted Pendulum (RIP) on a wheeled cart which is yet to be modeled using the bond graph technique. Therefore, this work explored the bond graph technique for this system. Using this technique, which uses the concept of energy (power) transfer between elements in a system, the system was modeled. Then, the state space equations of the system, which give the first-order differential equations, were derived. It was observed that the system has five state variables because of the five integrally causal storage elements.

[...] Read more.
Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective

By Suhel Ahmad Khan Mohd Nadeem Alka Agrawal Raees Ahmad Khan Rajeev Kumar

DOI: https://doi.org/10.5815/ijmecs.2021.06.04, Pub. Date: 8 Dec. 2021

The objective of this research study is to develop secure and multi-functional software or web application with controlled complexity. The demand of software security in different IT sectors is the main focus of the present endeavor. The different design factors and their prioritization are the need and demand of the system. We have selected the case of banking software or application. Security assessment is an integral part of risk management practices which provides an analytical mechanism to control and integrate security features for valuable opinion during the design phase. The designing of secure software and the impact of security factor is adopted and evaluated by the Preference Ranking Organization Method for Enrichment Evaluation (PROMETHEE)-II method. The PROMETHEE-II methodology evaluates the impact of factors with respect to the design alternatives. The current priority is to work on the state-of-the-art security attributes or alternatives of software design. Decision makers are generally responsible for evaluating various responses within their technical or scientific jurisdiction and rank them accordingly. Fuzzy set theories are the most appropriate tools to provide results for modeling qualitative information because of their ability to handle the impreciseness that is common in rating alternatives. The proposed work highlights the effectiveness of fuzzy PROMETHEE-II method in this context. We have enlisted this methodology for comparing software security factors in design perspective by using linguistic variables. The quantitative analysis attempted in our study was highly accurate for evaluating the security attributes and ranking them as per their priority, particularly in the context of banking software design. The study concludes with the advantages of employing the Fuzzy PROMETHEE-II vis-à-vis the other methodologies in analyzing the software security in the context of design.

[...] Read more.
CIPP-SAW Application as an Evaluation Tool of E-Learning Effectiveness

By Dewa Gede Hendra Divayana I Putu Wisna Ariawan Made Kurnia Widiastuti Giri

DOI: https://doi.org/10.5815/ijmecs.2021.06.05, Pub. Date: 8 Dec. 2021

The effectiveness level of e-learning implementation in the learning process at health colleges is very important for all users to know. Things that can be done to measure the level of effectiveness accurately is to carry out evaluation activities using computerized tools. One of the innovations found in this research was a computer-based evaluation application called the CIPP-SAW application. This application is formed by combining an educational evaluation model called CIPP (Context-Input-Process-Product) with a decision support system method called SAW (Simple Additive Weighting). Based on those situations, this research aimed to provide an overview of the user interface design and workings of the CIPP-SAW application used in evaluating the effectiveness of e-learning implemented in health colleges (case study in Bali province). This research was a development study using Borg & Gall’s design, which focused on the preliminary field test and main product revision stages. The subjects involved in the field trial of the CIPP-SAW application were 64 respondents. The respondents included: two informatics experts, two educational evaluation experts, 30 students, and 30 lecturers from several health colleges in Bali province. Data collection tools in the form of questionnaires, interview guidelines, and photo documentation. The analysis technique used was descriptive quantitative which compares the effectiveness level of the CIPP-SAW application with the effectiveness standard which refers to a scale of five. The results showed that the effectiveness level of the CIPP-SAW application was 87.521%, so it was in a good category.

[...] Read more.
Increasing Teacher Competence in Cybersecurity Using the EU Security Frameworks

By Ievgeniia Kuzminykh Maryna Yevdokymenko Oleksandra Yeremenko Oleksandr Lemeshko

DOI: https://doi.org/10.5815/ijmecs.2021.06.06, Pub. Date: 8 Dec. 2021

A study was undertaken to identify the missing skill and expertise of teachers and other stakeholders in the field of EU cyber security regulatory documents and frameworks. In order to increase the knowledge in this area and promote the EU security frameworks the model for the continuous building of teacher competence has been proposed and planned to be implemented in Ukraine. The proposed model will contribute towards improving the excellence of educators and academics, as well as increase competitiveness of educational programmes on cybersecurity among similar institutions in the EU countries. Various studies focused on the development of competence of the students to prepare them for the job market and build a comprehensive portfolio, education-business partnerships and collaboration. However, the issue of developing teacher expertise to achieve high quality of education remains open. We highlighted the importance of creating a cybersecurity ecosystem through the cooperation with different stakeholders and by implementing the model for continuous development of teacher competence.
Before building the model the overview and analysis of different teacher professional development approaches were conducted. Analysis showed that for our goal the best suitable approach is a model that consists of two stages based on self-education and group education approaches with 7 processes inside. The study revealed that competence may be achieved through a number of activities which may be grouped under four generic categories: student and staff training, academic and business seminars, business-oriented roundtable debates, and research. The model uses as main methods of achieving a better quality of education in cybersecurity the development of new training courses and modernization of educational programs, and for raising awareness among businesses and regulatory bodies - the workshops and roundtables.

[...] Read more.