Development of methodological principles for the construction of a corporate information-educational system of innovative-active university in the framework of anti-corruption activities
DOI:
https://doi.org/10.15587/1729-4061.2020.214895Keywords:
innovative and active university, corporate information and education system, model of corruption counteractionAbstract
Innovative activity of universities and the formation of entrepreneur universities of the innovative type is one of the forms of integration of the higher education systems of countries into the world educational and scientific space, support of their competitiveness. Based on the separation of interaction between universities and the economy and society, an evolutionary model of the university’s interaction with stakeholders was developed. Understanding the new mission of universities made it possible to separate the dominants of activities of an innovative and active university (IAU), to develop a scheme of the interconnection of management processes and its basic functions. The authors’ interpretation of the IAU and the preconditions for constructing a corporate information and education system (CIES) was formed.
Given the synergism and hybridity of modern cyber threats, the rise of corruption in the educational sphere, the Anti-corruption concept, which provides countering the elements of corruption and integrated hybrid threats through the construction of an adaptive information protection system (AIPS). The basis of corruption counteraction is the digital signature (DS) of the Key Certification Center (KCC) based on PKI (Public Key Infrastructure). To ensure the security of information resources (IR) of CIES, we proposed a model that makes it possible not only to take into consideration the synergy and hybridity of modern threats but also to form preventive anti-corruption measures. A model for providing anti-corruption measures that reflects the scenarios of the behavior of the participants of the corruption process and the anti-corruption bodies was developed. This makes it possible to assess the dynamics of the distribution of corruption deals over time and by the types of corruption to ensure the effective distribution of the university resources for anti-corruption activitiesReferences
- Zakon Ukrainy vid 1 lypnia 2014r. # 1556-VII «Pro vyshchu osvitu». Available at: https://zakon.rada.gov.ua/laws/show/1556-18#Text
- Ukaz Prezydenta Ukrainy «Pro Natsionalnu doktrynu rozvytku osvity» vid 17 kvitnia 2002 r. Available at: https://zakon.rada.gov.ua/laws/show/347/2002#Text
- Ukaz Prezydenta Ukrainy «Pro Natsionalnu stratehiyu rozvytku osvity v Ukraini na period do 2021 roku», vid 25 chervnia 2013 r. Available at: https://zakon.rada.gov.ua/laws/show/344/2013#Text
- Kontseptsiya rozvytku osvity Ukrainy na period 2015–2025 rr. Proekt. Available at: http://tnpu.edu.ua/EKTS/proekt_koncepc.pdf
- Kontseptualni zasady reformuvannia publichnoho finansuvannia ta upravlinnia zakladamy vyshchoi osvity. Available at: https://drive.google.com/file/d/1obC0K1NMhh9soat7LK9y-ughV4n070-h/view
- Engaging for Excellence: Generating alumni support for higher education. Advancement Metrics and research for education (2018). Washington: Case AM Atlas, 58. Available at: https://www.case.org/system/files/media/file/Engaging_for_excellence_2018_final.pdf
- Gaebel, M., Zhang, T., Bunescu, L., Stoeber, H. (2018). Trends 2018: Learning and teaching in the European Higher Education Area. Geneva: European University Association, 109. Available at: https://eua.eu/downloads/publications/trends-2018-learning-and-teaching-in-the-european-higher-education-area.pdf
- Taneja, P., Safapour, E., Kermanshachi, S. (2018). Innovative Higher Education Teaching and Learning Techniques: Implementation Trends and Assessment Approaches. 2018 ASEE Annual Conference & Exposition Proceedings. doi: https://doi.org/10.18260/1-2--30669
- Becker, B. A., Eube, C. (2018). Open innovation concept: integrating universities and business in digital age. Journal of Open Innovation: Technology, Market, and Complexity, 4 (1). doi: https://doi.org/10.1186/s40852-018-0091-6
- Kumar, S., Gokhale, A., Bhattacharya, S., Mathai, V. (2018). University of the Future: Bringing Education 4.0 to life. New Delhi: FICCI, Ernst & Young LLP, 60.
- GrenÄŤĂková, A., Ĺ panková, J., Petrušová, D. (2017). THE CHALLENGES AND TRENDS IN HIGHER EDUCATION. CBU International Conference Proceedings, 5, 616–621. doi: https://doi.org/10.12955/cbup.v5.995
- Estermann, T. (2013). Setting the context: University Autonomy & Funding in Europe: ATHENA Workshop Ukraine – Fostering Sustainable and Autonomous Higher Education Institutions.
- Seyfried, M., Pohlenz, P. (2018). Assessing quality assurance in higher education: quality managers’ perceptions of effectiveness. European Journal of Higher Education, 8 (3), 258–271. doi: https://doi.org/10.1080/21568235.2018.1474777
- Elken, M., Stensaker, B. (2018). Conceptualising “quality work” in higher education. Quality in Higher Education, 24 (3), 189–202. doi: https://doi.org/10.1080/13538322.2018.1554782
- Oppliger, R. (2005). Contemporary Cryptography. Artech House computer security series, 530.
- Clark, B. (1998). Creating Entrepreneurial Universities: Organizational Pathways of Transformation. Oxford/New York: Pergamon Elsevier.
- Gibbons, M. (1998). Higher Education Relevance in the 21st Century. The World Bank, 73. Available at: https://eric.ed.gov/?id=ED453721
- Huisman, J., Smolentseva, A., Froumin, I. (Eds.) (2018). 25 Years of Transformations of Higher Education Systems in Post-Soviet Countries. Palgrave Studies in Global Higher Education. doi: https://doi.org/10.1007/978-3-319-52980-6
- Seniwoliba, J. A., Boahene, B. E. (2015). Manifestation of corruption in higher education: the role of the University administrator. Research Journal of Educational Studies and Review, 1 (3), 78–88.
- Muzalevskaya, E. A. Proyavleniya korrupcii v sisteme obrazovaniya. Available at: http://www.mosgu.ru/nauchnaya/publications/SCIENTIFICARTICLES/2006/Mazulevskaja/
- Korrupciya radi vyzhivaniya. Available at: https://rian.com.ua/view/20151229/1002827333.html
- Kak ochistit' sistemu upravleniya obrazovaniem. Available at: http://ru.osvita.ua/vnz/high_school/46714/
- Zahorskyi, V. S. (Ed.) (2011). Upravlinnia yakistiu osvity u vyshchykh navchalnykh zakladakh. Ch. 1: Teoretychni zasady formuvannia system upravlinnia yakistiu nadannia osvitnikh posluh. Lviv: LRIDU NADU, 136.
- Revak, I. O. (2011). Koruptsiya: teoretyko-metodolohichni zasady doslidzhennia. Lviv: LvDUVS, 220.
- Rimskiy, V. L. Korrupciya v sisteme obrazovaniya Rossii. Available at: https://imrussia.org/media/pdf/Research/Vladimir_Rimsky__Corruption_of_the_Russian_Education_System.pdf
- Shevchenko, V. М. Features of education from the mechanisms of state administration, higher educational establishments іn the conditions of eurointegration and innovative development of Ukraine. Available at: http://www.kbuapa.kharkov.ua/e-book/db/2010-1/doc/5/07.pdf
- Klein, E. (2012). Academic Corruption and Reform in Russia and Ukraine. Governance Failure and Reform Attempts after the Global Economic Crisis of 2008/09. Case Studies from Central and Eastern Europe. Stuttgart, 173–190.
- Rumyantseva, N. L., Logvynenko, O. I. (2018). Ukraine: Higher Education Reforms and Dynamics of the Institutional Landscape. 25 Years of Transformations of Higher Education Systems in Post-Soviet Countries, 407–433. doi: https://doi.org/10.1007/978-3-319-52980-6_16
- Albrecht, W. S., Albrecht, C. O., Albrecht, C. C., Zimbelman, M. F. (2011). Fraud examination. Cengage Learning, 696.
- Christensen, C. M., Eyring, H. (2011). The Innovative University: Changing the DNA of Higher Education from the Inside Out. Available at: http://forum.mit.edu/wp-content/uploads/2017/05/FF12innovUniv.pdf
- Mokyr, J., Vickers, C., Ziebarth, N. L. (2015). The History of Technological Anxiety and the Future of Economic Growth: Is This Time Different? Journal of Economic Perspectives, 29 (3), 31–50. doi: https://doi.org/10.1257/jep.29.3.31
- Cai, Y., Etzkowitz, H. (2020). Theorizing the Triple Helix model: Past, present, and future. Triple Helix Journal, 1–38. doi: https://doi.org/10.1163/21971927-bja10003
- Etzkowitz, H., Viale, R. (2010). Polyvalent Knowledge and the Entrepreneurial University: A Third Academic Revolution? Critical Sociology, 36 (4), 595–609. doi: https://doi.org/10.1177/0896920510365921
- Wang, Y., Tang, B. (2020). Research and Practice on the Collaborative Education System for the Innovation and Entrepreneurship of E-commerce Major. 2020 International Conference on Big Data and Informatization Education (ICBDIE). doi: https://doi.org/10.1109/icbdie50010.2020.00053
- Valencia, A. V., Cázares, M. del C. T. (2016). Academic and research networks management: challenges for higher education institutions in Mexico. International Journal of Educational Technology in Higher Education, 13 (1). doi: https://doi.org/10.1186/s41239-016-0013-2
- Cappiello, G., Pedrini, G. (2017). The performance evaluation of corporate universities. Tertiary Education and Management, 23 (3), 304–317. doi: https://doi.org/10.1080/13583883.2017.1329452
- Margherita, A., Secundo, G. (2011). The stakeholder university as learning model of the extended enterprise. Journal of Management Development, 30 (2), 175–186. doi: https://doi.org/10.1108/02621711111105768
- Meissner, D., Erdil, E., Chataway, J. (Eds.) (2018). Innovation and the Entrepreneurial University. Springer. doi: https://doi.org/10.1007/978-3-319-62649-9
- Carayannis, E. G., Campbell, D. F. (2012). Mode 3 Knowledge Production in Quadruple Helix Innovation Systems. Springer. doi: https://doi.org/10.1007/978-1-4614-2062-0
- Guerrero, M., Toledano, N., Urbano, D. (2011). Entrepreneurial universities and support mechanisms: a Spanish case study. International Journal of Entrepreneurship and Innovation Management, 13 (2), 144. doi: https://doi.org/10.1504/ijeim.2011.038856
- Woozley, А. (2020). Theory of Knowledge: An Introduction. Routledge, 194. doi: https://doi.org/10.4324/9781003074663
- Cassiman, B., Valentini, G. (2015). Open innovation: Are inbound and outbound knowledge flows really complementary? Strategic Management Journal, 37 (6), 1034–1046. doi: https://doi.org/10.1002/smj.2375
- Dodgson, M., Hughes, A., Foster, J., Metcalfe, S. (2011). Systems thinking, market failure, and the development of innovation policy: The case of Australia. Research Policy, 40 (9), 1145–1156. doi: https://doi.org/10.1016/j.respol.2011.05.015
- Wang, C., Rodan, S., Fruin, M., Xu, X. (2014). Knowledge Networks, Collaboration Networks, and Exploratory Innovation. Academy of Management Journal, 57 (2), 484–514. doi: https://doi.org/10.5465/amj.2011.0917
- Andreeva, T., Kianto, A. (2012). Does knowledge management really matter? Linking knowledge management practices, competitiveness and economic performance. Journal of Knowledge Management, 16 (4), 617–636. doi: https://doi.org/10.1108/13673271211246185
- Alfalih, A. A., Ragmoun, W. M. (2020). The role of entrepreneurial orientation in the development of an integrative process towards en-trepreneurship performance in entrepreneurial university: A case study of Qassim university. Management Science Letters, 1857–1872. doi: https://doi.org/10.5267/j.msl.2019.12.033
- The World’s Most Innovative Universities 2019. Available at: https://www.reuters.com/innovative-universities-2019
- A Guiding Framework for Entrepreneurial Universities. Available at: https://www.oecd.org/site/cfecpr/EC-OECD%20Entrepreneurial%20Universities%20Framework.pdf
- European Commission (EC) (2013). Entrepreneurship 2020 Action Plan: Reigniting the Entrepreneurial Spirit in Europe, European Commission, DG Enterprise & Industry, COM (2012) 795 final, Brussels, Belgium.
- The entrepreneurial university: from concept to action (2013). National Centre for Entrepreneurship in Education (NCEE). Available at: https://ncee.org.uk/wp-content/uploads/2018/01/From-Concept-To-Action.pdf
- The Entrepreneurial University of the Year 2014 (2014). National Centre for Entrepreneurship in Education (NCEE). Available at: http://ncee.org.uk//?s=Entrepreneurial+University+of+the+Year+2014
- Hryshchuk, R., Yevseiev, S., Shmatko, A. (2018). Construction methodology of information security system of banking information in automated banking systems. Vienna: Premier Publishing s. r. o., 284. doi: https://doi.org/10.29013/r.hryshchuk_s.yevseiev_a.shmatko.cmissbiabs.284.2018
- X.509 : Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks. Available at: https://www.itu.int/rec/T-REC-X.509/en
- Dudykevich, V. B., Maksimovich, V. N., Mikitin, G. V. (2016). Strategiya bezopasnosti kiberfizicheskih sistem. Informacionnye tekhnologii v upravlenii, obrazovanii, nauke. Kharkiv: Vid-vo FOP V.V. Petrov, 286–300.
- Aktual'nye kiberugrozy – 2017: trendy i prognozy (2018). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2017/
- Aktual'nye kiberugrozy – 2018. Trendy i prognozy (2019). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2018/
- Aktual'nye kiberugrozy: itogi 2019 goda (2020). Available at: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2019/
- Sardak, S. E. (2018). Struktura sredy i urovney upravleniya social'no-ekonomicheskih sistem. Problemy sozdaniya informacionnyh tekhnologiy, 28, 57–64.
- Bartock, M., Cichonski, J., Souppaya, M., Smith, M., Witte, G., Scarfone, K. (2016). Guide for cybersecurity event recovery. NIST. doi: https://doi.org/10.6028/nist.sp.800-184
- Yevseiev, S., Hryhorii, K., Liekariev, Y. (2016). Developing of multi-factor authentication method based on niederreiter-mceliece modified crypto-code system. Eastern-European Journal of Enterprise Technologies, 6 (4 (84)), 11–23. doi: https://doi.org/10.15587/1729-4061.2016.86175
- Yevseiev, S., Korol, O., Kots, H. (2017). Construction of hybrid security systems based on the crypto-code structures and flawed codes. Eastern-European Journal of Enterprise Technologies, 4 (9 (88)), 4–21. doi: https://doi.org/10.15587/1729-4061.2017.108461
- Yevseiev, S., Tsyhanenko, O., Ivanchenko, S., Aleksiyev, V., Verheles, D., Volkov, S. et. al. (2018). Practical implementation of the Niederreiter modified cryptocode system on truncated elliptic codes. Eastern-European Journal of Enterprise Technologies, 6 (4 (96)), 24–31. doi: https://doi.org/10.15587/1729-4061.2018.150903
- Yevseiev, S., Ponomarenko, V., Ponomarenko, V., Rayevnyeva, O., Rayevnyeva, O. (2017). Assessment of functional efficiency of a corporate scientificeducational network based on the comprehensive indicators of quality of service. Eastern-European Journal of Enterprise Technologies, 6 (2 (90)), 4–15. doi: https://doi.org/10.15587/1729-4061.2017.118329
- Shmatko, O., Balakireva, S., Vlasov, A., Zagorodna, N., Korol, O., Milov, O. et. al. (2020). Development of methodological foundations for designing a classifier of threats to cyberphysical systems. Eastern-European Journal of Enterprise Technologies, 3 (9 (105)), 6–19. doi: https://doi.org/10.15587/1729-4061.2020.205702
- Colwill, C. (2009). Human factors in information security: The insider threat – Who can you trust these days? Information Security Technical Report, 14 (4), 186–196. doi: https://doi.org/10.1016/j.istr.2010.04.004
- Kraemer, S., Carayon, P., Clem, J. (2009). Human and organizational factors in computer and information security: Pathways to vulnerabilities. Computers & Security, 28 (7), 509–520. doi: https://doi.org/10.1016/j.cose.2009.04.006
- Bowen, B. M., Devarajan, R., Stolfo, S. (2011). Measuring the human factor of cyber security. 2011 IEEE International Conference on Technologies for Homeland Security (HST). doi: https://doi.org/10.1109/ths.2011.6107876
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Serhii Yevseiev, Olena Rayevnyeva, Volodymir Ponomarenko, Oleksandr Milov
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.