"Learning in the Networked Society"
By Professor Piet Kommers, University of Twente, The Netherlands
Piet Kommers specialized during his master degree in education in ICT for adapting to learners’ cognitive style and mental repertoire in the late 70ties. His PhD was in conceptual representations for navigating in hypertext systems. Since 1990 he specialized in 3D virtual reality and surgical training. As editor of the International Journal of Continuous Engineering Education and Life-Long Learning he has coordinated more than 12 special issues. He then started the International Journal of Web-based Communities. Since 2004 he became chairman of the IADIS conferences. As associate professor of the University of Twente he teaches Media for Communication and Education. Since his work together with the Kiev UNESCO Institute for Educational Technology he received the honorary professor title. His work now for International Student Exchange makes him keen on educational policies and capacity building. His publications can be found here.
This keynote addresses the growing impact of societal factors like the notion of “Networked Society” in the further evolution of education. So far the role of technology in education has been marginal as it was limited to emulate and virtualize traditional face-to-face teacher/student interactions. Now when societal transformations become visible, it is inevitable that education shifts its accent from the transfer- into the development of new expertise for instance via problem-based learning. The method for making rather accurate extrapolations of current trends into to-morrow’s practice is to re-interpret the recent educational transformations. As exemplar the potential impact of social media on education will be elaborated.
"Usage Control Management System for Privacy and Security Protection"
By Professor Dr. Ramlan Mahmod, Dean of the Faculty of Computer Science and Information Technology, Universiti Putra Malaysia
He obtained his degree in Computer Science from Michigan State University, USA and his Master in Computer Science from Central Michigan University, USA. His PhD is in Artificial Intelligence from Bradford University, United Kingdom. He has been a lecturer at Universiti Putra Malaysia since 1985 and is currently the Dean of Computer Science Faculty, Universiti Putra Malaysia. He was seconded to MIMOS Berhad for two years from 2008 -2009 to help R&D in Trusted Computing and Information Security. He has published more than 80 journal papers and more than 110 articles in conference proceedings.
He has filed 10 patents and holding more than 10 software copyrights. More than 25 PhD and Master student graduated under his supervision and currently supervising and co-supervising more than 15 PhD and Master student. His current research interest is Information Security especially in Cryptographic Algorithms, Steganography, Digital Forensics and Trusted Computing.
Widespread and the growth of better IT infrastructures have pushed the incredible usage and increased information and resource sharing between large amounts of users. A wide spectrum of communication and transaction in businesses, organizations, governments, and common people are done through network systems. In current systems, policies that involve matching and integrating of data open to enormous security challenges and numerous privacy leakages due to unauthorized users that can access information at anywhere and anytime. We proposed a Usage Control Management System (UCMS) for protecting security and privacy of both data and users. This model protects private data from illegal access before and during the usage in all networking systems. Moreover, UCMS also provides security for various and multi-purpose systems. UCMS includes policy management, authentication and authorization centers. All policies are defined by administrator and manage via policy management center. Policy management center can be applied for different networking system such as governmental and organizational systems. Authentication center controls the access before the usage, and then it is subsequently, controlled by the authorization center during the usage. Furthermore, the proposed usage control management system is flexible, environment independent and can be developed and implemented for different platforms.
Keywords: usage control;security; privacy; policy management; authentication; authorization;