1
PREFACE
1. The necessity of the thesis In the context of the development and boom of information technology and data, information and data are becoming important resources that need to be protected. In the process of exploring and seeking knowledge from data, information security issues has been challenging. The information security situation in Vietnam has been going through complicated developments. Foreign special agencies, hostile and reactionary forces have intensified intelligence, espionage, terrorism, and destroy of the information technology system; disseminating harmful information to influence internal politics, intervene, and steer policies and laws of Vietnam. Increasing cyberattacks aimed at targeting national important information technology systems. Crime in the field of information technology evolve complicatedly, increasing the number of attacks and sophisticated tricks, causing serious damage in many aspects.
The Government has had many undertakings, policies and measures to develop and ensure information security, especially the sovereignty of cyberspace. The legal bases can be mentioned as the Law on Cyber Information Security (2015) and the Law on Cyber Security (2018), which affirmed and institutionalized the policies of the Party and State on information security, protection of information and information systems, contributing to protecting national sovereignty on cyberspace. In order to ensure information security in the context of the information society in Vietnam today, the issue of training and retraining of information security human resources at agencies, units, and management entities is being placed and more urgent than ever. Special attention is paid to specialized forces in the fields of defense and security and socioeconomic.
In the field of information security, foreign information security experts will not share all their experiences in preventing cyberattacks because this is always confidential information. Therefore, in order to train highquality human resources in information security for the social economy and in the defense and security sector, the role of the information security lecturers at the universities of Ministry of Defense and Ministry of public security is extremely important.
With the above meaning, the problem of developing of information security lecturers at the universities of Ministry of defense and Ministry of public security is posed as an indispensable requirement for all levels of management; especially with the management subjects of the Ministry of defense and Ministry of public security are assigned with key training in information security. Therefore, the Ph.D. student chooses the topic " Developing information security lecturers at universities in the field of National Defense and Security in the Current context” as the research topic for the doctoral dissertation in Education Management.
2. Purposes of Research Based on the research on the theoretical issues of the development and development of human resources in the field of higher education, as well as the
2
current situation of the development of information security lecturers at universities in the field of National Defense and Security. Proposing solutions to develop information security lecturers at universities in the field of National Defense and Security to contribute to the training of highquality human resources in information security for national Defence and security and socio economic in the current context.
3. Object and Subject of Research 3.1. Object of Research The development of information security lecturers at universities in the field
of National Defense and Security.
3.2. Subject of Research Developing of information security lecturers at universities in the field of National Defense and Security according to the theory of human resource development.
4. Scientific hypothesis Faced with the need to renew the training of highquality human resources in information security for field of national defense and security and socio economics, information security lecturers at universities in the field of National Defense and Security has many shortcomings. Proposing and applying solutions to develop information security lecturers accordance with the new situation built on: theory of human resource development, framework of professional capacity for information security lecturer. Proposed solutions to help develop highquality human resources for information security for field of national defense and security and socioeconomic in the current context.
5. Mision of Reseach Systematize the theoretical basis for the development of high education lecturers, point out the basic elements, analyze the specific properties that affect the development of information security lecturers. Surveying and evaluating the status of the development of information security lecturers and the factors affecting the development of information security lecturers. Proposing solutions to develop information security lecturers, testing a solution to develop information security lecturers to confirm the effectiveness of these solutions.
6. Research question What is the role of information security lecturers at universities in the field of National Defense and Security in the context of the industrial revolution 4.0 and educational innovation?, what solutions to development of information security lecturers are sufficient in quantity, reasonable in structure and quality in accordance with the requirements of training highquality human resources in information security for national defense and security and social economy. in the context of non traditional security challenges caused by technological developments and globalization in the present context? 7. Scope of Research
3
Limit the scope of research: Research was conducted at 03 universities in Ministry of defence and Ministry of public security assigned by the Prime Minister to provide key training in information security, including: Institute of Cryptography Techniques Ministry of Defence; Military Technical Academy Ministry of Defence; People Security Academy Ministry of Public Security.
Limit on the object of investigation: Investigate Managers, Lecturers, Students, Graduate Students, Ph.D. student at universities in the field of National Defense and Security.
8. Methodology and methods of Research 8.1. Approach method To accomplish the objectives of the topic, the thesis uses the following approaches: approach to dialectical materialism; approach of the system; approach of standardized; approach of capacity. 8.2. Research Methods 8.2.1. Group of theoretical research methods: Analyzing, synthesizing, retrospectively, generalizing ... in the reseach of scientific documents to build a database for the development of information security lecturers at universities in the field of National Defense and Security.
8.2.2. Group of practical research methods: Investigating by questionnaires, interviews, research of active products, attendance ... to research the status of capacity and development status of information security lecturers at universities in the field of National Defense and Security.
8.2.3. Other method groups: data processing by mathematical statistics. 9. Arguments to defend doctoral thesis Information security lecturers has a decisive role in ensuring that the quality of information security human resources meets the requirements of the field of national defense and security and socio economic in Vietnam in the current context.
information security Lecturers lack of limited number of professional capabilities, have not met the requirements of developing highquality human resources in information security for nation defense and security and socio economic in the current context.
Solutions for developing information security lecturers based on the theory of human resource development, Framwork of Professional competency for information security lecturers that the thesis builds are useful.
10. New contributions of the doctoral thesis The thesis has explained and clarified the theoretical basis of developing high education lecturers and the practice of developing information security lecturers in universities of Ministry of defense and Ministry of public security. Specifically: generalizing and clarifying the concept of information security lecturer, information security lecturers, information security industry, developing information security lecturers at universities of the National Defense and Security, as well as the analysis of the characteristics of the information security lecturers in the current context, point
4
out the path to the development of information security lecturers and the operational factors. impact on the development of information security lecturers in the current context; overview of develop information security lecturers. In particular, the thesis proposes solutions to develop of information security lecturers at universities in the field of National Defense and Security in the current context that are suitable with the practical conditions of the universities.
5
11. The theoretical and practical significance of the doctoral thesis 11.1. Theoretical meaning: The thesis synthesizes and systematizes the theoretical basis to propose solutions to develope of information security lecturers at universities in the field of National Defense and Security, contributing to supplementing and enriching management theory, educational management, develop high education lecturers.
11.2. Practical significance: Provide solutions to develop information security lecturers to improve the quality of information security human resources for defense and security sector and socioeconomic. The solutions are applicable to universities that are assigned key training in information security in other fields with similar conditions. The research results of the dissertation can be used as reference materials for the leadership, management and development of high education lecturers at universities in the current context. Provide a practical basis to propose to the Party Committees, heads of the Ministry of National Defense, and the Ministry of Public Security in leading and promulgating policies to support of universities of Ministry of defense and Ministry of public security to develop information security lecturers in the present context.
12. Doctoral thesis structure In addition to the introduction, conclusions and recommendations, references
and appendices, the Doctoral thesis is presented in 3 chapters;
Chapter 1: Theoretical basis for the development of information security
lecturers at the universities of National Defense and Security in the current context.
Chapter 2: The situation of the information security lecturers and the development of information security lecturers at the universities of National Defense and Security in the current context.
Chapter 3: Solutions to develop information security lecturers at the
universities of National Defense and Security in the current context.
Chapter 1 THEORETICAL BASIC FOR THE DEVELOPMENT INFORMATION SECURITY LECTURERS AT THE UNIVERSITIES OF NATIONAL DEFENSE AND SECURITY IN THE TODAY CONTEXT
1.1. Literature Review 1.1.1. Literature Review of lecturer and development of lecturers. 1.1.2. Literature Review of development of lecturers at universities in the
field of National Defense and Security.
1.2. Current context and issues for information security training In this section, the author has analyzed and clarified the concepts: information security lecturer, information security industry, information security lecturers, development of information security lecturers, as well as analyzing the characteristics of this lecturer in the today context.
6
1.3. The content develops of information security lecturers of universities in the field of National Defense and Security according to the theory of human resource development.
1.4.1. HR planning for lecturers 1.4.2. Recruitment and using of lecturers. 1.4.3. Create a development environment for the lecturers. 1.4.4. Evaluation and using of lecturers. Using is to assign information security lecturers of universities in the field of
Defense and Security to work positions suitable to the capacity of the lecturer.
1.4.5. Training and retraining of lecturers 1.4.6. Remuneration, honor of lecturers 1.4.7. Create an environment for the development of the lecturers 1.5. Factors affecting the development of information security lecturers
in the current context.
1.5.1. Subjective factors The subjective factors affecting the development of information security lecturers are identified as the factors that belong to subjects from within the universities in the field of National Defense and Security with training in Information security has a direct impact on the development of information security lecturers.
1.5.2. Objective factors Objective factors affecting the development of information security lecturers are identified as factors derived from socioeconomic conditions, mechanisms, policies, and specific major the impact directly or indirectly on the development of information security lecturers.
Summary of chapter 1 Chapter 2 THE SITUATION OF INFORMATION SECURITY LECTURERS AT UNIVERSITIES OF THE NATIONAL DEFENSE AND SECURITY IN THE CURRENT CONTEXT
2.1. Overview of universities in the field of National Defense and Security
security are assigned trainning information security. 2.1.1. Institute of Cryptography Techniques 2.1.2. Military Technical Academy 2.1.3. People Security Academy 2.2. Introduce organization of status survey 2.3. The situation of information security lecturers at universities in the
field of National Defense and Security
2.3.1. The situation of number information security lecturers
7
Table 2.1 Statistics of pedagogical and professional qualifications of
information security lecturers
qualification Pedagogical qualifications
num university TS Doctor Master Engineer Certificate Not certificate
01 02 03 MTA PSA ACT
SUM num % num % num % num % num % 3.00 80 0.00 12 3.64 15 2.5 107 80.00 19 19.00 26.67 26 57.78 27.27 32 58.18 77 38.5 53.5 1 1.00 7 15.56 8 14.55 16 97.00 100 96.36 97.5 97 45 53 195 3 0 2 5 8 100 45 55 200
The results in Table 2.1 show that the qualifications and qualifications of the information security lecturers at the universities of ministry of defense and ministry of security meet the conditions required by the Ministry of Education and Training. That helps universities in the ministry of defense and ministry of public security to be proactive in performing the task of education and training, meeting the requirements of training human resources in information security for the national defense and security and social economy.
2.3.2. Thi situation of the structure of information security lecturers. 2.3.3. The situation political qualities of information security lecturers.
Table 2.2 The assessment political quality of the information security
lecturers
political quality SUM rank level (%) weak least mid rather good
4,41 2 0,0 0,0 12,9 32,6 54,4
4,66 1 0,0 0,0 0,0 34,1 65,9
4,23 3 0,0 15,3 46,5 38,2 0,0
4,21 4 0,0 6,5 65,9 27,6 0,0
3,96 7 0,0 0,0 31,2 41,8 27,1
3,94 8 0,0 0,0 26,5 52,9 20,6
4,08 5 0,0 0,0 24,1 44,1 31,8
4,06 6 0,0 0,0 22,9 48,2 28,8 Political and ideological views about the country and the nation Passionately with the nation ideal and country, have passion for teaching Having discipline, collaboration and the striving for the benefit of the nation Dedication and responsibility Consciousness of learning to improve professional qualifications and perfecting the personality of lecturer Awareness of absorbing national culture, promoting national potential There is a spirit of service, inclusion and sharing with the community There is a spirit of cooperation with colleagues
8
GPA 4,19
The survey results in Table 2.2, the quality of information security lecturers of Universities at the ministry of Defense and ministry of public Security is high, with the average score = 4.19. However, the above survey also shows that some information security lecturers have limited language skills, negatively affecting their access to foreig document resources, causing difficulties in teaching and learning.
2.3.4. The status of the professional qualifications of the information
security lecturers
Table 2.3 The status of the professional qualifications of the information
security lecturers
qualities rank scor e
Specialized and precise, 54,1 0,0 0,0 6,5 3,67 6 level (%) weak least mid rather good 39, 4
The ability
1 3,99 0,0 0,0 55,3 21,8 22, 9
3 3,89 0,0 0,0 34,7 27,1 38, 2
3,93 2 0,0 5,3 50,0 24,1 20, 6
3,87 4 0,0 2,9 35,9 27,1 34, 1
3,86 5 0,0 0,0 36,5 24,7 38, 8
1. scientific specialized knowledge to update 2. professional knowledge and information security situation domestically and internationally 3. Practical understanding and the ability to relate and apply practice to teaching activities specialized Applying 4. knowledge to solving problems in professional practice 5. Use of professional skills in teaching activities 6. The world's ability to access new knowledge of information security applied in the teaching process
GPA 3,86
The survey results on the status of the professional qualifications of the information security lecturers shown in Table 2.3 show that: The professional qualifications of the information security lecturer are generally assessed at fair with an GPA = 3.86. If compared with the average score of quality, the average score of the professional ability is evaluated lower (3.86 versus 4.19). This shows that management and lecturer when surveyed rated the professional qualifications of the information security lecturers below their qualities.
9
2.3.5. The status of pedagogical capacity of information security lecurers. Table 2.4 Evaluation of pedagogical capacity of information security lecturers
Content
level (%) weak least mid rather good 10,6 0,0 37,1 52,4 0,0
Prepare content for the teaching Using methods and teaching facilities for teaching activities 0,0 0,0 47,1 35,3 17,6
0,0 0,0 28,8 51,2 20,0
0,0 0,0 38,2 34,1 27,6
0,0 0,0 39,4 36,5 24,1 Using communication language in teaching Examination and evaluation of students' learning results Organize and control classes, build a friendly and positive learning environment
GPA
The results in Table 2.4 show that, the pedagogical capacity of information security lecturers is good, in which the ability to "Use communication language in teaching" is rated the highest with the GPA = 3.89.
2.3.6. The status of the training program development and implementation
training program of the information security lecturers.
Table 2.5 Status assessment of training program development and implementation capabilities of information security lecturers
level (%)
content AS rank least mid rather good wea k
the
3 3,79 0,0 0,0 39,4 42,4 18,2
1 3,89 0,0 0,0 34,1 42,4 23,5
3 3,79 0,0 0,0 36,5 48,2 15,3
3,80 2 0,0 0,0 39,4 41,2 19,4
Understand training process, implementation and methods, training program development techniques Develop, adjust and update training program content to meet the training requirements Design and use proficiency in training program evaluation tools Implement and guide the implementation of the training program in accordance with the university’s regulations
GPA 3.81
10
2.3.7. The status of the career development capacity of the information
security lecurers.
Table 2.6 The status of career development capacity of information security lecturers
AS rank Content level (%) weak least mid rather good
0,0 0,0 34,7 39,4 25,9 3,91 2
and 3,85 3 0,0 0,0 35,0 45,0 20,0
3,92 1 0,0 0,0 33,2 41,5 25,3
3,74 6 0,0 0,0 48,2 30,0 21,8
3,77 5 0,0 0,0 39,4 44,1 16,5
3,78 4 0,0 0,0 44,1 33,5 22,4 Ability to selfevaluate professional development Make a plan for your own career improve your development professional qualifications Ability to selfstudy, selftraining, update new knowledge to develop their own Use foreign language for career development activities Use information technology to serve career development activities Ability to advise, help and support colleagues in career development
GPA 3.83
In general, the career development capacity of information security lecturers is good: (GPA = 3.83). The two best competencies that are best performed by lecturers in information security at universities in the ministry of defense and ministry of public security are " Ability to selfstudy, selftraining, update new knowledge to develop their own” ranked 1st with GPA = 3.92.
2.4. Status of information security lecturers development. 2.4.1. Status of information security lecturers development planning 2.4.2. Recruitment situation of information security lecturers Table 2.7 Evaluation of recruitment of information security lecturers
level (%) Content AS rank weak least mid rather goog
preparation 0,0 0,6 80,6 7,1 3,94 1
0,0 4,1 52,4 7,6 3,64 2 Recruitment process Recruitment notice, receive and select candidate profile
Recruitment process 0,0 3,5 29,4 6,5 3,39 4
0,0 10,6 38,8 7,1 3,42 3 The recruitment results are fair and accurate 11, 8 35, 9 60, 6 43, 5
11
GPA 3,59
The statistics in Table 2.7 show that the recruitment of information security lecturers at the universities of ministry of defense and ministry of public security is done at a fair level with GPA = 3.59. Two contents are best performed: "Recruitment preparation process" ranked 1st, with GPA = 3.94. Content ranked last is: "The results of recruitment are fair and accurate", GPA = 3.39.
2.4.3. Situation of using information security lecturers.
Table 2.8 Evaluation of the activity level using the information security lecturer
Content level (%) weak least mid rather good
0,0 4,7 48,8 42,9 3,5
0,0 4,1 36,5 57,6 1,8
0,0 17,1 40,0 39,4 3,5
0,6 7,1 52,9 35,3 4,1 The use of lecturers is performed scientifically and reasonably The performance assessment is made clear and transparent The method uses the appropriate evaluation The criteria for disposition and evaluation of lecturers reasonably
From the results in Table 2.8: The actual use and evaluation of information security lecturers of the universities in the ministry of defense and ministry of public security is done. In which the content "The performance evaluation is made clear and transparent" is the highest rated with GPA = 3.57. The content "The method of using appropriate assessment" is the lowest with GPA = 3.29.
2.4.4. The situation of training and retraining for information security
lecturers.
Table 2.9 Evaluation of training and retraining for information security
lecturers
Content AS rank level (%) weak least mid rather good
3,19 4 0,0 14,7 54,7 27,1 3,5
and training 3,20 3 0,0 13,5 55,3 28,8 2,4
3,03 8 0,0 15,3 67,6 15,9 1,2
Training and retraining to meet job requirements Reasonable retraining methods The amount of training meets the needs of improving lecturers' qualifications and skills Use after training reasonably Have an interest in the training 3,09 3,09 5 5 0,0 0,0 12,4 67,1 14,7 64,1 19,4 18,8 1,2 2,4
12
courses offered by the university
GPA 3,12
The results Table 2.9 shows that the universities of ministry of defense and ministry of public security are not really flexible in managing and operating the adjustment of training plans, content, and programs, which directly affects the quality of training. Because factors in this content need constant adjustment according to the requirements of innovation, the changing needs of the defense and security and socio economic sectors.
2.4.5. The situation of implementation of police, creating working
environment for information security lecturers.
Table 2.10 Evaluation of the implementation of policy and creating a
Content AS rank
ả ươ ờ
working environment for information security lecturers level (%) weak Least mid rather good 1,2 77,6 0.0 0,6 51,2 0.0 0,6 57,1 0.0 13,5 33,5 17,1 3,08 3,20 2,93 7,6 14,7 25,3 4 1 8
3,01 7 0.0 18,2 64,1 16,5 1,2
3,06 5 0.0 18,8 22,4 1,2 57, 6 The salary system is clearly ợ ể Th i đi m tr l ng h p lý Maintain current salary Reasonable and complete welfare policy The reward mechanism creates the motivation to promote the working spirit of the faculty
Reasonable promotion 0.0 3,03 6 15,3 15,9 1,2
0.0 3,09 2 12,4 19,4 1,2
3,09 2 0.0 14,7 18,8 2,4 Promotion mechanism has the effect of motivating Continue to want to stick with the university for a long time 67, 6 67, 1 64, 1
GAP 3,06
The results in Table 2.10 show that the level of implementation of policies and creating a working environment for information security lecturers at universities in the field of National Defense and Security is average with GPA = 3.06.
2.4.6. The situation of examine and evaluate the development of information
security lecturers.
Table 2.11 – The status of implementation of information security
lecturers development planning
level (%) Content AS rank rather good
3,15 4 0,0 7,6 22,4 0,0 Make a plan for the test of lecturer’s development weak least mid 70, 0
13
0,0 Check the recruitment of lecturers 3,33 0,0 14,7 1 7,6
0,0 Check the lecturer’s assignment 2,98 0,0 20,0 6 17,6
3,18 3 0,0 11,2 30,0 0,0 37, 6 62, 4 58, 2
the training and 3,21 2 0,0 8,8 61,8 29,4 0,0
3,10 5 0,0 11,2 62,4 24,7 0,0
Check the layout and use of a lecturer Checking retraining of lecturers Checking the implementation of motivational policies for the development of the lecturers
GAP 3,16
The results of implementing the information security lecturers development plan at universities in the ministry of defense and ministry of public security are performed at an average rate with GPA = 3.16, in which the level of good performance is not (0%).
2.5. The sitution factors affecting the development of information
security lecturers.
2.5.1. The influence of subjective factors
Table 2.12 Evaluation of the impact of the subjective factors on the
Very
development of information security lecturers Partly affected Quite influential Little effect influential AS S Subjective factors Not affected SL % SL % SL % SL % SL %
0 0,0 0 0,0 16 4,71 125 29,07 199 58.53 4,54 1
0 0,0 0 0,0 41 12,06 98 22,79 201 59,12 4,47 3
0 0,0 8 2,35 53 15,59 116 26,89 163 47,49 4,28 4
Attraction and remuneration policy for the lecturers Autonomy of the university in lectures development The attention of management subjects regarding the development of lecturers
14
0 0,0 2 0,59 24 7,06 109 25,35 205 60,29 4,52 2
3 0,9 26 7,65 64 18,82 101 23,49 146 42,94 4,06 5
Selfstudy and self training to improve the quality and capacity of the lecturers The position and employment of the lecturers GAP 1 0,18 7 2,12 40 11,65 110 25,53 183 53,76 4,37
The results in Table 2.12 show that, subjective factors greatly affect the development of information security lecturers in universities of ministry of defense and ministry of security when 4/5 factors are very influential; 1/5 factors are quite influential, GPA = 4.37 (GPA = 1 and max = 5).
2.5.2. The influence of objective factors
Table 2.13 Evaluation of the impact of the objective factors on the
development of the lecturers
AS S Little effect Partly affected Objective factors Not affecte d Quite influentia l Very influenti al or de r SL % SL % SL % SL % SL %
sector
0 0,0 20 5,88 39 11,47 116 26,98 165 48,53 4,25 1 2
and to
0 0,0 0 0,00 15 4,41 138 32,09 187 55,00 4,51 2 1
3 0 0,0 17 5,00 39 11,47 131 30,47 153 45,00 4,24 3
State and management mechanisms policies related lecturers The impact of the 4.0 revolution on lecturer’s development requirements Investing in facilities equipment for teaching for universities of ministry of defense and ministry of public security trend 4 The of 5 1,5 27 7,94 28 8,24 134 31,16 146 42,94 4,14 5
15
5 6 1,8 18 5,29 26 7,65 132 30,70 158 46,47 4,23 4
internationalization and in globalization international integration key Ranking universities for information security training
GAP 2 0,65 16 4,82 29 8,65 130 30,28 162 47,59 4,27
The results in Table 2.13 show that, the objective factors greatly affect the development of information security lecturers at universities in the ministry of defense and ministry of public security. There are 4 very influencing factors and 1 quite influencing factor, GPA = 4.33.
16
2.6. General assessment of the status of information security lecturers at
universities in the field of National Defense and Security.
2.6.1. Advantages Managers of universities in the ministry of defense and ministry of public security with training in information security were surveyed very interested in building and developing of information security lecturers.
The directors of universities in the field of National Defense and Security with training in information security were surveyed interested in developing information security lecturers from planning and implementing plans, developing ethical qualities, capacities for lecturers, implementing training programs, professional development capabilities, the work of selecting and using and creating a working environment for the security lecturers. All information and initial results have been obtained.
Information security lecturers at universities in the National Defense and Security are reasonably structured, with high qualifications to meet the requirements of fundamental and comprehensive innovation in higher education.
The surveyed at universities in the National Defense and Security with training in information security evaluate that the selection of information security lecturers is done relatively well, in the recruitment process These lecturers have built appropriate recruitment criteria to recruit excellent students, especially those who have graduated from postgraduate information security in the foreigner with advanced education.
The use of information security lecturers according to survey results is also done, according to PhD students from universities in the ministry of defense and and ministry of public security. The information security lecturers has been used relatively reasonably based on their qualifications, working experience, and level of dedication to create the most favorable conditions, ensuring fairness at a reasonable level.
The managers and Information security lecturers have a correct understanding of the role of information security lecturers development activities at universities in the National Defense and Security. The managers and information security lecturers correctly and appropriately evaluate the impact of the factors affecting the development of information security lecturers at universities in the National Defense and Security
2.6.2. Disadvantages There are still many shortcomings in the development of information security at universities in the National Defense and Security, the competency framework for professional information security lecturers has not yet been built in the today context. The information security lecturers has limited foreign language proficiency, especially direct communication with foreigners. This is a barrier in the process of international integration, the exchange of lecturers with universities in information security in other countries with advanced higher education.
17
The work of planning for the development of information security lecturers at universities in the National Defense and Security is still at a low level and needs to be improved in the coming time.
The implementation of the training and retraining of information security lecturers at universities in the National Defense and Security according to the results of practical research and practical observations of PhD students is not really effective, the annual professional training is not really focused and formal.
The quality of information security lecturers at universities in the National Defense and Security surveyed is not really equal in terms of qualifications. The issue of selfstudy and improve the level of an information security lecturers has certain limitations.
The rotation and assignment of jobs for information security lecturers at universities in the National Defense and Security are facing difficulties, many excellent graduates students do not want to stay in the university to be lecturers. The brain drain phenomenon is still occurring quite often because the lecturers of information security have transferred their work to universities with better remuneration rates; Some lecturers sent to training abroad do not want to return.
The implementation of policies and create a driving force for the development of information security lecturers at universities in the National Defense and Security has many limitations due to many reasons, including barriers to The most policy is related to the salary and bonus regime for those working in the field of defense and security. The universities have not really been selfreliant on the building of policies to motivate the information security lecutrers, so the universities still mainly rank of the officer to pay salaries. But not really based on job position, teaching quality, especially scientific research, so it is difficult to have a remuneration policy for "talented lecturers", which have many works published in journals of international in the list of ISI, Scopus ...
2.6.3. Reason Due to the limited qualifications and capacity of some managers and lecturers
in information security, some are not really dedicated to the career.
Due to pressure of the society and especially the new requirements of the industrial revolution 4.0, it is not easy for universities in the ministry of defense and ministry of public security with training in information security to immediately adapt to change.
Due to mechanisms and policies of universities in the ministry of defense and ministry of public security and the subjective ministries, the pedagogical environment has not been given attention and has not created a development motivation for the lecturers of information security.
Due to the nature of the profession, the source of information security lecturers at universities in the National Defense and Security are good students who are retained, so they hardly have professional training in pedagogy, so they Some information security lecturers have poor teaching skills.
18
Summary of chapter 2
19
Chapter 3 SOLUTIONS FOR DEVELOPING INFORMATION SECURITY LECTURERS AT THE NATIONAL DEFENSE AND SECURITY IN THE TODAYCONTEXT
3.1. The principles propose solutions to developing information security
lecturers in the today context 3.1.1. Ensure Legal 3.1.2. Ensure systematic 3.1.3. Ensure practicality 3.1.4. Ensure effectiveness 3.2. Organizing the development of the information security lecturers at
universities in the National Defense and Security
Including 07 solutions, Raising awareness of leaders and lecturers of information security. Building and perfecting the professional capacity framework for the information security lecturers. Planning information security lecturers according to the professional competency framework. Recruit and use information security lecturers according to the professional competency framework. Evaluate and classify the lecturers of information security according to the professional competency framework. Training and retraining of information security lecturers according to the professional competency framework. Remuneration policy and creating a working environment create a driving force for the development of information security lecturers. PhD student would like to present in the following two solutions:
3.2.1. Building and perfecting the professional capacity framework for the
information security lecturers.
3.2.1.1 The purpose of the solution 3.2.1.2. The content of the solution The professional capacity framework of information security lecturers at universities in the ministry of defense and and ministry of public security is built with 6 standards: 1) Standards of lecturers in the field of defense and security; 2) Professional capacity; 3) Teaching capacity; 4) Scientific research capacity; 5) Social activity capacity; 6) International integration capacity; in which each standard includes the criteria with a total of 22 criteria. As follows:
Table 3.1 Professional competency framework for information security
lecturers
Standard 1
Criterion 1: (General criteria)
Standard of lecturers in information security in the field of defense and security Having firm political, absolute loyalty to the Fatherland and the people, to the Communist Party of Vietnam and the State of the Socialist Republic of Vietnam; has a high revolutionary vigilance, is ready to fight, make sacrifices, and successfully complete all assigned tasks;
20
Having revolutionary qualities; save integrity, indifferent mindset; to exemplify the observance of the Party's lines and undertakings, the State's policies and laws; promote democracy, strictly observe the discipline of the army and police; respect and solidarity with the people, with teammates; to be trusted by the people; Possessing political, military science and security qualifications and the ability to creatively apply MarxismLeninism, Ho Chi Minh's thought, the Party's and State's lines, views and undertakings to the mission. building national defense and security, building the people's army, the people's police in the current context; have knowledge of culture, economy, society, law and other fields; have practical capacity to meet the requirements of assigned tasks; graduate from a training program as prescribed for each position; Have a clear profiles, age and health suitable for the position and rank of office undertakes.
The specific criteria for each position of lecturers are specified by the competent authority. Criterion 2: (Specific criteria)
Standard 2 Professional in information security field
Criterion 3
Criterion 4
Criterion 5
Firmly focus of education and training in the field of information security To firmly grasp the Party, State, military and police's orientations in training information security human resources to ensure national security and socioeconomic development in the current context. Master knowledge of information security field Have indepth knowledge of information security subjects (basic knowledge, specialized knowledge of information security), update knowledge and focus orientation of education and training in the field of information security, specialized knowledge of information security at all training levels; Ability to update interdisciplinary knowledge information security Having indepth interdisciplinary knowledge of information security in the fields of mathematics, information technology, electronics and telecommunications, law, defense, security and industrial revolution 4.0.
Criterion 6 Collaborate and connect with information security company in the
field of defense and security Exploiting the contents and methods of cooperation to work with colleagues, experts, leaders and commanders of information security units in the field of national defense and security in Vietnam and the world; be able to link with information security company to develop
21
Criterion 7
skills in handling information security situations in the field of defense and security and socioeconomic. Apply international integration knowledge into information security activities Know how to apply knowledge of international integration into the objectives, content, methods, educational facilities and assessment of students' training results suitable to each type of student and specific training environment in the field of defense and security.
Standard 3 Teaching capacity
Criterion 8
Criterion 9
Understand learners and support to develop learners' competencies Having knowledge of education, especially higher education; Psychological knowledge, especially knowledge of pedagogical psychology and student age psychology in the universities of ministry of defense and ministry of public security. Having indepth knowledge and wellorganized practical training activities, experiencing and developing a system of student understanding skills in teaching to military lecturers. Ability to build a positive military pedagogical culture environment in each university of ministry of defense and ministry of public security in association with the role of selftraining and training to improve students' understanding members of each military lecturer. Military career counseling and orientation help students discover and develop their own potentials. Assist students in developing relationships with agencies and businesses in the fields of defense and security and socio economics related to the training major. Developing objectives, teaching plans, contents, and program of subjects assigned to the information major. Understand the characteristics of the teaching process in the current information security curriculum. Determine the objectives of the course to ensure that the training objectives of the information security major are closely followed to meet the needs of the field of defense and security and socioeconomic. Design theory and practice lesson suitable to specific subjects, learners' characteristics and training environment in the field of defense and security; Focus on the practical of information security in designing practical lessons. Contribute to, edit, and develop training programs in accordance with the practical requirements of teaching and practice in the information security for the field of defense and security and socioeconomic. Building textbooks, references, selfstudy guides for students of information security at universities of the ministry of defense and ministry of public security. Regularly update and enrich the system of
22
Criterion 10
Criterion 11
lessons, textbooks, references, selfstudy guides for students of information security in universities of the ministry of defense and ministry of public security. Using teaching methods and facilities Having an understanding of university teaching methods and university teaching in defense and security environment. Proficient and effective use of teaching methods, especially teaching practical skills and professional internships to information security students in the universities of ministry of defense and ministry of public security, in accordance with teaching objectives and content according to military career orientation, characteristics, capacity and defense and security environment. Proficient use of teaching facilities suitable to teaching objectives, contents, and methods. Regularly update and use modern teaching facilities to improve teaching efficiency. Ability to flexibly use active teaching facilities (case teaching, group discussion, discovery, simulation, ...) suitable and close to the actual operating conditions of the police information security in the field of defense and security and socioeconomic. Examination and evaluation of students' learning results. Mastering the training regulations, understanding the types, methods, testing techniques, and evaluating the learning results of students according to competencybased approach. Do a process evaluation; monitor the learning process of students in different forms of teaching organizations; design and use forms of testing evaluation according to competencybased approach, special attention to assessing skills and professional attitudes. Instruct students to conduct selfassessment in the learning process (including students who evaluate themselves and students evaluate each other); Monitor students' selfassessment to ensure accuracy, fairness, and objectivity. Coordinate with information security agencies in the field of defense and security where students are assigned to practice, evaluate students' learning results, including: coordinating content design internship; keep regular contacts to ensure student learning is monitored; coordination in assessing the results of internships / practices of students. Using student assessment results, student feedback and the professional world to adjust and improve teaching; Participate in quality accreditation of information security training programs
Criterion 12 Build a learning environment
23
Standard 4
Criterion 13
the regulations on intellectual
Ability to design, organize and manage teaching activities in different teaching environments: in the classroom (lecture halls, laboratories) and outside the classroom (fieldwork, practice sites, ...). Building a militarized learning environment, however, still ensures friendliness, openness, encourages students' activeness, creativity and cooperation. Scientific research capacity Scientific research and publish research results. Detect research problems from teaching practices and expertise in information security, especially from information security practices in the field of defense and security and social economics. To assume or coordinate in preparing scientific profile to participate in the selection of scientific research topics and research projects at all levels in the field of information security. Writing scientific articles on information security to be published in domestic and foreign scientific journals; write topics, scientific reports, presentations at scientific conferences and seminars. Organizing and participating in scientific research activities; participate in scientific reports at conferences, scientific seminars in the field of information security and interdisciplinary. Participating in international cooperation activities in scientific and technological research in the field of information security. Write reports on research results from science and technology topics and projects in the field of information security. Participate in compiling textbooks; materials for teaching and learning; a practical guide for a subject related to the information security major. property and Mastering commercialization of research results in the field of information security. Guiding students to penetrate information security practices in the field of defense and security and socioeconomics to discover research problems and to study the problems of information security practices in the field of defense and security and socioeconomic
Criterion 14 Transfer of research results
Disseminate and apply research results to the teaching of individuals and professional groups. Transfer and commercialize results of scientific and technological research in information security Carrying out or coordinating implementation to transfer technology and apply scientific and security advances in service of field defense and security and socioeconomic.
24
Criterion 15
Standard 5
Criterion 16
Criterion 17
Publication of the results of scientific research on theory and practice by books and reference materials for training and research on information security. Guide students to research science Organization to guide students in scientific research; effective research method; develop the forte of students to organize training and retraining. Social activity capacity Have experience working in agencies and enterprises or have collaborative relationships with information security agencies and enterprises inside and outside the field of defense and security. Plan, seek, and build relationships in the field of expertise, especially with information security agencies and units inside and outside the field of defense and security. Regularly maintain relationships and communication between individuals, faculties, schools, and information security agencies and units within and outside field of defense and security. Contact to send information security students to the field; Collect feedback from partners to improve the quality of training and effectiveness of cooperation between of universities in the ministry of defense and ministry of public security and information security agencies and units inside and outside field of defense and security. Proactively connect, participate in activities of cooperation between faculty, school and the professional world; especially in the field of scientific and technological research; practice, internship of students; Scientific advisor on information security issues for information security units inside and outside field of defense and security. Build and develop relationships within and outside the school, with institutions to lead or participate in research tasks related to the field of information security. Capacity for community service Actively participate in activities of mass organizations at different levels in the school / society; Participate in imparting scientific and technological knowledge in the field of information security to the community in many different forms (directly, through the media); Participate in advising and advising information security units inside and outside field of defense and security related to information security. International integration capacity
Standard 6 Criterion 18 Manners, communication skills
Comply with the discipline and manners of military instructors,
25
Criterion 19
Criterion 20
Criterion 21
Criterion 22
especially those that have become universal values of international practice. Ability to work in an international environment, adapting to high labor intensity, with a professional and modern working style, in accordance with international practices. Having the ability to master both informatics and ways of using digital means for international integration. Ability to grasp, evaluate, forecast the situation Must be able to proactively capture and assess information correctly, and be in tune with the actual situation. Must have longterm vision, strategic thinking and scientific predictive capacity, be sensitive in identifying challenges and seizing opportunities. Participate in learning and improve "soft" skills in the integration period. Mastering professional cultural communication skills (educators, information security specialists, social activists ...) Selfstudy capacity, lifelong learning. Obtain evaluation comments on the competencies of colleagues and students; humbly learn to improve pedagogical capacity; develop creative selfstudy capacity, lifelong selfstudy. About the capacity to introduce Vietnam's information security science to the world and absorb the world's information security science into practical conditions field of defense and security and socioeconomic in Vietnam. To grasp and well absorb information security science knowledge of Vietnam and the world so that they can be applied to the actual conditions of the field of defense and security and socioeconomic in Vietnam in the today context.
3.2.2.3 Conditions for implementing the solution There is a high consensus on views, awareness of the importance, meaning and the need for a professional competency framework of information security lecturers in the development of lecturers at all levels.
There is a consensus and positive response from information security lecturers as they are themselves actors in the recognition, implementation and development of the professional values that are summarized in the competency framework.
Have a flexible and creative method of applying the criteria of the professional competency framework in the stages of planning, recruiting, using, training, retraining, promoting, evaluating trainers ... in accordance with practical circumstances and requirements of university in the ministry of defense and security.
26
3.2.2. Training and retraining of information security lecturers according to
the professional competency framework. 3.2.2.1 The purpose of the solution 3.2.2.2 Content and how to do it Determining needs for training and retraining of information security
lecturers.
Develop a plan to train and retrainning of information security lecturers. Implement training plans, retrainning and developing of information security
lecturers.
Building lecturers in the field of information security 3.2.2.3 Conditions for implementing the solution The work of planning for training and retraining of information security lecturers must be scientific, public, transparent, and consensus of all members of the university; The content, training and retraining programs must ensure modernity, meet teaching practice requirements and suit the needs of each individual lecturer in information security major.
Having funds to meet the training and retraining needs to improve the
capacity of performing tasks for information security lecturers.
Having a good relationship in international cooperation in training, scientific research and technology transfer in information security with research institutes, universities, and information security units in the domestically and internationally.
3.3. Test the urgency and feasibility of the solutions 3.3.1. Test results on the urgency Table 3.2 Assessment of the necessity of proposed solutions to develop information security lecturers
Necessity
TT Solutions MS rank Necessary Very necessary Unneces sary
SL % SL % SL %
1 163 85,50 27 14,20 0 0,00 2,86 2
2 155 81,57 35 18,43 0 0,00 2,82 5
3 150 78.94 40 21.06 0 0,00 2.78 7
Raise awareness lecturers and leaders of information security major Professional competency framework for information security lecturers Planning for the development of information security lecturers according to the professional competency framework
27
4 to 161 84,73 29 15,27 0 0,00 2,85 3
Recruit and use information security lecturers according the professional competency framework
5 158 83,15 32 16,85 0 0,00 2,83 4
Examining and evaluating of information security lecturers in the professional competency framework
security 6 164 86,31 36 18,96 0 0,00 2,92 1
7 152 80,00 38 20,00 0 0,00 2,80 6
retraining of training and information lectures according to the professional competency framework Remuneration policy and creating a working environment create a driving for the development of information security lecturers
The results shown in table 3.2 above show that, in general, all 7 proposed solutions are assigned by experts, administrators and lecturers at universities in the ministry of defense and ministry of public security is deemed necessary and necessary.
28
3.3.2. Feasibility test results
Table 3.3 Experiment on the feasibility of lecturers development solutions
possibility
Feasibility TT Solutions MS rank Is not Feasibility
Very Feasibility SL % SL % SL %
1 143 75,27 47 24,73 0 0,00 2,75 3
2 competency information 133 70,00 45 23,68 12 13,32 2,64 6
3 138 72,64 42 22,10 10 11,11 2,67 5
4 156 82,10 26 13,69 8 8,89 2,78 2
Raise awareness lecturers and leaders of information security major Professional framework for security lecturers Planning for the development of information security lecturers according to the professional competency framework Recruit and use information security lecturers according to the competency professional framework
142 74,75 36 18,94 12 13,33 2,68 4 5
Examining and evaluating of information security lecturers in the professional competency framework
6 151 79,46 39 20,54 0 0,00 2,79 1
7 130 68.42 46 24.21 14 7.37 2,62 7
training and retraining of information security lectures according to the professional competency framework Remuneration policy and creating a working environment create a driving for the development of information security lecturers
The result r = 0,9 from which it can be concluded that the necessity and the feasibility of the 7 proposed solutions are positively and very closely correlated, which allows to draw conclusions if any measure is needed. At the same time, it is also feasible and practical to help develop information security lecturers at universities in the ministry of defense and ministry of public security.
3.5. Test a solution proposed by the PhD thesis 3.5.1. Test purpose 3.5.2. Select a test solution
29
Solution 6: “training and retraining of information security lectures
according to the professional competency framework”
3.5.3. Test hypothesis 3.5.4. Test results
Table 3.4 Survey results to evaluate the capacity of lecturers before the training Good Rather medium Imqualified
Degree evaluation Evaluation criteria
SL % SL % SL % SL 18 45.0 15 25.0 0.0 27 0 % 30.0
0 0.0 27 45.0 0.0 33 55.0 0
12 20.0 15 25.0 5.0 30 50.0 3
9 15.0 24 40.0 12 20.0 15 25.0
12 20.0 25 41,6 5 8,34 15 25.0
Prepare for the lesson Using methods and means for teaching activities Using communication language in teaching Examination and evaluation of students' learning results Organizing and controlling the classroom, building a friendly and positive learning environment
MS 15,01 39,31 6,04 39,64
Conclude: Through the results obtained after testing the organization of training – retraining building for the information security lecturers at the universities of ministry of defense and ministry of public security according to the professional capacity framework. PhD students have seen a clear change in a positive direction. On the average results of all criteria: comparable good performance (before test 15.0% and after test: 44.31%). That is a good threefold performance; performance level decreased slightly (before test: 39.32 and after test: 37.33%); The average performance rate increased slightly (before trial: 6.05 and after test: 8.68%). In contrast to good performance, unsatisfactory performance fell proportionally (before test: 39.63% and after test: 9.68%).
Table 3.5 Results of survey on teaching capacity of lecturers after
participating in training and retraining courses Good Rather medium Imqualified
Degree evaluation Evaluation criteria
SL % SL % SL % SL 0 45 15 25.0 75.0 0.0 0 % 0.0
6 10.0 27 45.0 15 25.0 12 20.0
21 35.0 30 50.0 0 0.0 9 15.0
22 36,6 25 41,6 5 8,34 5 8,34 Prepare for the lesson Using methods and means for teaching activities Using communication language in teaching Examination and evaluation of students' learning results
30
39 65.0 15 25.0 6 10.0 0 0.0
Organizing and controlling the classroom, building a friendly and positive learning environment
MS 37,33 8,68 9,68
44,31 Comment: After completing the training, PhD student collects opinions from the lecturers participating in the training about the retraining program capacity building for the information security of lecturers according to the professional competency framework. Survey results show:
100% of lecturers participating in the test rated the training as very necessary
and met the wishes of the lecturers when participating in the course.
100% of lecturers agree with the renovation of the training such as the arrangement of the program, the content of the training course that the PhD student has built.
80% of lecturers are very interested and 20% of lecturers are interested in
participating in the training.
The assessment of the degree of meeting the objectives of the course showed that: 100% of lecturer assessed that the objectives of the training course were achieved according to the proposed plan.
In summary, from the results obtained through the testing of the solution, it has shown the feasibility and effectiveness of the solution " training and retraining of information security lectures according to the professional competency framework".
Summary of chapter 3
CONCLUSION AND RECOMMENDATION
1. Conclude The quality of developing information security lecturers is still quite limited in some management aspects: training and retraining; rotation and appointment, Inspection and evaluation; policies and regimes to create motivation for the development of information security lecturers.
The subjective and objective factors greatly affect the development of the information security lecturers. Influence level of subjective factors is stronger than objective factors. The impact of factors is different, with the most influential subjective factor being "Policy on attraction and remuneration of universities in the ministry of defense and ministry public security for information security lecturers" and objectively "The impact of the 4.0 revolution on the requirement of developing the lecturers of information security major".
The thesis has contributed to deepen the theoretical basis of the lecturers of information security and the development of information security lecturers at universities in the ministry of defense and ministry public security. Regarding the development of the lecturers, the dissertation has generalized the theoretical issues of information security lecturer, information security major, information security
31
lecturers, especially to develop information security lecturers according to the theory of human resource development in order to improve the quality of training information security human resources, enhance the role of information security lecturers in the context of industrial revolution 4.0.
The test results highly appreciate the necessity and feasibility of solutions to
develop information security lecturers proposed in the thesis.
The thesis has tested the solution of "" training and retraining of information security lectures according to the professional competency framework ". The test results have confirmed the effectiveness of the solution in the development of information security lecturers at universities in ministry of defense and ministry of public security.
With the results, the author has done the research tasks, answered the research
questions, proves the scientific theory posed;
2. Recommendations 2.1 For the Ministry of Defense and the Ministry of Public Security Proposing the Government to develop a new project on "Training and developing information security human resources" to replace the Decision No. 99 / QĐTTg, of the Prime Minister approving the Project "Training and developing information security human resources until 2020”, has expired.
Research, formulate and issue the project "International cooperation in training information security human resources", paying attention to and investing in the training of information security lecturers at universities in the ministry of defense and ministry of public Security.
Increasing selfresponsibility for the universities in the ministry of defense and ministry of public security assigned training in information security: allowing university to determine the annual number of staff lecturer; and deploying pay salary according to job positions.
2.2. For universities in the National Defense and Security, they are assigned
training in information security
2.3. For lecturers in information security at universities in the National
Defense and Security
Information security lecturers at universities in the National Defense and Security must constantly strive to improve their ethical qualities, professional capabilities as well as be aware of the roles, positions and responsibilities of lecturers in training activities, scientific research and relations with information security units to improve their professional capacity.