|
UPSI Digital Repository (UDRep)
|
|
|
|
||||||||||||||||||||||||||||
| Abstract : Universiti Pendidikan Sultan Idris |
| This article aims to investigate the professional and ethical negotiation on managing cyber conflict prevention towards misuse and exploitation of massive social media adoption from the higher learners’ perspective. The qualitative approach from forum discussion was made among sixty higher education learners with the selection criteria. The data gathered were analyzed using thematic basis and compared with the findings from literature analysis from relevant peer reviewed journals. All were investigated, analyzed, extracted, and proposed into the professional and ethical negotiation for cyber conflict prevention. The finding revealed the principal value of digital professional skills enhancement in online practice consisting of digital competence skills, digital practice adaptability and stability, and digital technical application skills. Moreover, the digital ethical responsibility in online practice consists of communication and information accuracy enhancement, digital manner adaptability and transparency, accountability and security. We propose a dynamic discussion that encompasses enhancing ethical commitment on information accuracy for cyber conflict management; considering ethical manner on digital manner adaptability for cyber conflict arrangement; strengthening professional skills on transparency and security information quality for cyber conflict arrangement; and empowering professional negotiation accountability for cyber conflict management. © 2024 IGI Global. All rights reserved. |
| References |
Abadi, S., Huda, M., Basiron, B., Ihwani, S.S., Jasmi, K.A., Hehsan, A., Safar, J., Mohamed, A.K., Embong, W.H.W., Mohamad, A.M., Noor, S.S.M., Novita, D., Maseleno, A., Irviani, R., Idris, M., and Muslihudin, M. (2018a). Implementation of fuzzy analytical hierarchy process on notebook selection. International Journal of Engineering and Technology. 7(2.27), 238-243. Abadi, S., Huda, M., Hehsan, A., Mohamad, A.M., Basiron, B., Ihwani, S.S., Jasmi, K.A., Safar, J., Mohamed, A.K., Embong, W.H.W., Noor, S.S.M., Brahmono, B., Maseleno, A., Fauzi, A.N., Aminudin, N., and Gumanti, M. (2018b). Design of online transaction model on traditional industry in order to increase turnover and benefits. International Journal of Engineering and Technology. 7(2.27), 231-237. Abadi, S., Huda, M., Jasmi, K.A., Noor, S.S.M., Safar, J., Mohamed, A.K., Embong, W.H.W., Mohamad, A.M., Hehsan, A., Basiron, B., Ihwani, S.S., Maseleno, A., Muslihudin, M., Satria, F., Irawan, D., and Hartati. S. (2018c). Determination of the best quail eggs using simple additive weighting. International Journal of Engineering and Technology. 7(2.27), 225-230. Abadi, S., Teh, K.S.M., Huda, M., Hehsan, A., Ripin, M.N., Haron, Z., Muhamad, N.H.N., Rianto, R., Maseleno, A., Renaldo, R., and Syarifudin, A. (2018d). Design of student score application for assessing the most outstanding student at vocational high school. International Journal of Engineering and Technology. 7(2.27), 172-177. Abadi, S., Teh, K.S.M., Nasir, B.M., Huda, M., Ivanova, N.L., Sari, T.I., Maseleno, A., Satria, F., and Muslihudin, M. (2018e). Application model of k-means clustering: insights into promotion strategy of vocational high school. International Journal of Engineering and Technology. 7 (2.27), 182-187. Akatyev, N., & James, J. I. (2017). Legislative Requirements for Cyber Peacekeeping. Journal of Digital Forensics. Security and Law, 12(3), 4. Akoto, W. (2021). International trade and cyber conflict: Decomposing the effect of trade on state-sponsored cyber attacks. Journal of Peace Research, 58(5), 0022343320964549. doi:10.1177/0022343320964549. Al-Mohannadi, H., Awan, I., Al Hamar, J., Al Hamar, Y., Shah, M., & Musa, A. (2018, August). Understanding awareness of cyber security threat among IT employees. In 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 188-192). IEEE. doi:10.1109/W-FiCloud.2018.00036. Alatalu, S. (2020). Cyber Commands-A Universal Solution to a Universal Cyber Security Challenge? In Redesigning Organizations (pp. 27-43). Springer. doi:10.1007/978-3-030-27957-8_2. Ali, N., & Hong, J. E. (2018). Failure detection and prevention for cyber-physical systems using ontology-based knowledge base. Computers, 7(4), 68. doi:10.3390/computers7040068. Aminudin, N., Fauzi, Huda, M., Hehsan, A., Ripin, M.N., Haron, Z., Junaidi, J., Irviani, R., Muslihudin, M., Hidayat, S., Maseleno, A., Gumanti, M., and Fauzi, A.M. (2018a). Application program learning based on android for students experiences. International Journal of Engineering and Technology. 7(2.27), 194-198. Aminudin, N., Huda, M., Ihwani, S.S., Noor, S.S.M., Basiron, B., Jasmi, K.A., Safar, J., Mohamed, A.K., Embong, W.H.W., Mohamad, A.M., Maseleno, A., Masrur, M., Trisnawati, and Rohmadi, D. (2018b). The family hope program using AHP method. International Journal of Engineering and Technology. 7(2.27), 188-193. Aminudin, N., Huda, M., Mohamed, A.K., Embong, W.H.W., Mohamad, A.M., Basiron, B., Ihwani, S.S., Noor, S.S.M., Jasmi, K.A., Safar, J., Natalie, L., Ivanova, Maseleno, A., Triono, A., and Nungsiati. (2018c). Higher education selection using simple additive weighting. International Journal of Engineering and Technology. 7(2.27), 211-217. Anggraeni, E.Y., Huda, M., Maseleno, A., Safar, J., Jasmi, K.A., Mohamed, A.K., Hehsan, A., Basiron, B., Ihwani, S.S., Embong, W.H.W., Mohamad, A.M., Noor, S..S.M., Fauzi, A.N., Wijaya, D.A., and Masrur, M. (2018). Poverty level grouping using SAW method. International Journal of Engineering and Technology. 7(2.27), 218-224. Anshari, M., Almunawar, M. N., Shahrill, M., Wicaksono, D. K., & Huda, M. (2017). Smartphones usage in the classrooms: Learning aid or interference? Education and Information Technologies, 22(6), 3063-3079. doi:10.1007/s10639-017-9572-7. Azvine, B., & Jones, A. (2019). Meeting the future challenges in cyber security. In Industry 4.0 and Engineering for a Sustainable Future (pp. 137-152). Springer. doi:10.1007/978-3-030-12953-8_9 Boeke, S., & Broeders, D. (2018). The demilitarisation of cyber conflict. Survival, 60(6), 73-90. doi:10.1080/00396338.2018.1542804. Borghard, E. D., & Lonergan, S. W. (2018). Confidence building measures for the cyber domain. Strategic Studies Quarterly, 12(3), 10-49. Brantly, A. F. (2018, May). The cyber deterrence problem. In 2018 10th International Conference on Cyber Conflict (CyCon) (pp. 31-54). IEEE. doi:10.23919/CYCON.2018.8405009. Broeders, D., Cristiano, F., & Weggemans, D. (2021). Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy. Studies in Conflict and Terrorism, ___, 1-28. Brown, G. D. (2020). International law and cyber conflict. In Routledge Handbook of International Cybersecurity (pp. 366-378). Routledge. doi:10.4324/9781351038904-36. Cornish, P. (2017). Deterrence and the ethics of cyber conflict. In Ethics and Policies for Cyber Operations (pp. 1-16). Springer. doi:10.1007/978-3-319-45300-2_1. Egloff, F. J. (2020). Contested public attributions of cyber incidents and the role of academia. Contemporary Security Policy, 41(1), 55-81. doi:10.1080/13523260.2019.1677324. Fasana, K. G. (2018). Another manifestation of cyber conflict: Attaining military objectives through cyber avenues of approach. Defence Studies, 18(2), 167-187. doi:10.1080/14702436.2018.1462661. Galende, N., Ozamiz-Etxebarria, N., Jaureguizar, J., & Redondo, I. (2020). Cyber dating violence prevention programs in universal populations: A systematic review. Psychology Research and Behavior Management, 13, 1089-1099. doi:10.2147/PRBM.S275414 PMID:3329936. Gill, A. S. (2020). The changing role of multilateral forums in regulating armed conflict in the digital age. International Review of the Red Cross, 102(913), 261-285. doi:10.1017/S1816383121000059. Gill, A. S. (2020). The changing role of multilateral forums in regulating armed conflict in the digital age. International Review of the Red Cross, 102(913), 261-285. doi:10.1017/S1816383121000059. Grigoriadis, A., Darra, E., Kavallieros, D., Chaskos, E., Kolokotronis, N., & Bellekens, X. (2021). Cyber Ranges: The New Training Era in the Cybersecurity and Digital Forensics World. In Technology Development for Security Practitioners (pp. 97-117). Springer. doi:10.1007/978-3-030-69460-9_6. Hanafi, H. F., Selamat, A. Z., Ghani, M. M., Mustafa, W. A., Harun, M. F., Naning, F. H., & Alkhayyat, A. et al. (2023). A review of learner's model for programming in teaching and learning. Journal of Advanced Research in Applied Sciences and Engineering Technology, 33(3), 169-184. Huda, M. (2019). Empowering application strategy in the technology adoption: Insights from professional and ethical engagement. Journal of Science and Technology Policy Management, 10(1), 172-192. doi:10.1108/JSTPM-09-2017-0044. |
| This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |