<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analyzing Students' Online Activity to Enhance Education Quality and Boost University Digital Security</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valerii Lakhno</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nurzhamal Oshanova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jamilya Akhmetova</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nurgazy Kurbaniyazov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Miroslav Lakhno</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kazakh National Pedagogical University named after Abay</institution>
          ,
          <addr-line>13 Dostyk ave., Almaty, 050010</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kazakh National University named after Al-Farabi</institution>
          ,
          <addr-line>71 Al-Farabi ave., Almaty, 050038</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>6a Heroyiv oborony str., Kyiv, 03041</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Sh. Yesenov Caspian University of technology and engineering</institution>
          ,
          <addr-line>32 Microdistrict, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>426</fpage>
      <lpage>431</lpage>
      <abstract>
        <p>This article proposes an algorithm for a Decision Support System (DSS) that helps to improve the quality of education and the level of security of the Digital Educational Environment of Universities (DEEU), based on the analysis of users' Digital Tracks (DTs). The algorithm is based on the matrix factorization of users' DT. In contrast to known solutions, the proposed solution allows us to level the problem of developing the competency profile of students and employees, primarily in matters of acquiring Information Security (IS) skills. This will contribute to increasing the level of security of the DEEU in general. It is shown that mastering new competencies related to information security issues expands the profile not only of students, but also of university staff, and ultimately contributes to the formation of future specialists who have a proactive position in information security issues and are capable of self-organization in this subject area. The implementation of artificial intelligence methods in such DSS can be realized based on machine learning, using, for example, the matrix factorization of DTs.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Learning quality</kwd>
        <kwd>digital tracks</kwd>
        <kwd>matrix factorization</kwd>
        <kwd>machine learning</kwd>
        <kwd>information security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The creation of a DEEU is a key element of the
modern educational system in any developed
country. Publications [1–3] show that with the
development of Information Technologies (IT),
a high-quality DEEU contributes significantly
to the improvement of the quality of education.
The creation of a centralized information
management system has several important
reasons: relevance and accessibility of
information, interactive training, flexibility
and mobility, individualization of training,
development of digital skills, saving resources
of educational institutions, etc. [4, 5]. During
training, students leave various so-called DTs.
Here is just a small list of such DTs left by
students during their studies and interactions
with the DEEU [6–8]: email; online learning
platforms; social media; digital files; internet
searches; etc. These DTs can be useful for
students, teachers, and university
administrators for tracking educational
progress, assessing work, communicating, and
analyzing data to improve the quality of the
educational process. No less important,
however, is the task of ensuring the
confidentiality and protection of these DTs and
the personal data of students and teachers. The
latter is because in many cases the DT of DEEU
users contain personal information. Therefore,
the information contained in the DT may be
subject to cyber-attacks or misuse. In the
context of the globalization of education [9],
universities should adapt their IS policies to
protect data in the DT to the maximum extent
possible, and inform students of the
institution’s strategy for protecting user data,
its IS policy, and specific practices for
protecting their DT [
        <xref ref-type="bibr" rid="ref6 ref7">10–12</xref>
        ].
      </p>
      <p>Information security of the DEEU is a
complex system that provides for the
protection of the information space available
in an educational institution. Such a system or
systems make it impossible to damage or steal
the personal data of participants in the
educational process, as well as information
that has financial, intellectual value, etc.
Ensuring the effective functioning of the
information security system of DEEU requires
the expenditure of certain financial resources
within the framework of the data protection
strategy chosen by the educational institution.
When developing such a strategy, it is
advisable to take into account factors of the
external and internal environment, since
achieving an optimal result can only be
achieved if a balance is found between the
available capabilities and the desired results.
These results also include the integral goal of
improving the quality of education by
leveraging the potential of all forms of
organizing the educational process and
developing the infrastructure of universities in
the context of digital transformation. In such a
situation, for the management of an
educational institution and personnel
responsible for information security policy, a
context-driven approach to intelligent decision
support for ensuring information security of
the centralized information security system
based on the analysis of users’ central systems
may become in demand.</p>
      <p>All of the above predetermined our interest
in research in this area.</p>
      <p>The purpose of the study is to develop an
algorithm for a decision support system that,
based on the analysis of DT, contributes to
improving the quality of education and the
degree of security of the DEEU.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Methods and Models</title>
      <p>When analyzing DT in a DEEU, administrators,
and information security specialists are most
often concerned with analyzing log files. In
addition, log files and DT are related in the
context of analyzing digital evidence of user
actions. Here are just a few examples of the
relationship between log files and users’ DT in
the CSO: information storage in the DEEU; event
recovery; data analysis; etc. Thus, log files and
DT are interrelated, since log files contain
information about events and actions that can
be analyzed to identify, locate, and interpret DT
in the context of analyzing digital evidence of
the activities of users of DT, both in the context
of improving the quality of the educational
process and in the context of IS DEEU. Log files
are independent characteristics of a user’s work
on the university network. They contain
information about system logins, resource
usage, errors, network activity, and other
events in the data center.</p>
      <p>However, to fully understand the context of
a user’s experience, log files typically require
analysis and interpretation by other tools.</p>
      <p>
        Contextual characteristics of a user’s
experience in the DEEU can include
information about time, location, applications
used, and other factors that may be related to
the user’s specific situation or task in the
DEEU. These characteristics can be extracted
from log files. However, additional analysis and
context is usually required. Such analysis can
be implemented using specialized software,
such as Splunk, ELK Stack (a software stack
that includes Elasticsearch, Logstash, and
Kibana), etc. [
        <xref ref-type="bibr" rid="ref8">13, 14</xref>
        ].
      </p>
      <p>The level of security of the DEEU can be
increased in particular by using decision
support systems, artificial intelligence, and
machine learning methods.</p>
      <p>In the context of the research objectives, it
is necessary to develop an algorithm for DSS
that, based on the analysis of the DT, helps to
improve the quality of education and the level
of security of the DEEU. In the approach
proposed below, artificial intelligence is
expressed through machine learning
techniques using matrix factorization.</p>
      <p>We believe that the DEEU has many users:
and tasks related to information security
U = {u1, …, un} both educational tasks E = {e1, …,
em} and tasks related to IS DEEU—S = {s1, …, sk}.</p>
      <p>Then administrators of the DEEU have access
to matrices containing, for example:
• Ratings are given by users based on their</p>
      <p>priority for educational tasks—MEn×m.
• And, also characterizing the user from
the point of view of compliance with
information security rules when
working in the DEEU—MSn×k.</p>
      <p>In the matrix MEn×m, a certain number is put
in place of meij(i∈1, …, n; j∈1, …, m) if the user
of the DEEU (ui) evaluates the task (ej) based on
his priorities, and remains empty otherwise.</p>
      <p>Data is taken based on user DT from Moodle,
Blackboard, Canvas, Google Classroom, etc.</p>
      <p>To fill out the second matrix according to
the criteria for safe behavior in the DEEU, we
will identify the following types of users
according to the level of their competence in
information security issues:</p>
      <p>Knowledgeable users. This group includes
users who are well aware of the information
security risks in the university network or the
DEEU as a whole. Such users take active
measures to ensure the information security of
their data and accounts in the DEEU. Such
users punctually follow recommendations for
creating complex passwords, regularly update
software, do not open suspicious links or
attachments in emails, and use reliable
antivirus software.</p>
      <p>Careless users. This group includes users who
do not pay due attention to information security
measures. Consequently, they are quite
vulnerable to attacks, both external and internal.</p>
      <p>Users of this group typically use weak passwords
and repeat them for different accounts. These
users, usually, ignore suspicious activity on the
network and do not comply with measures to
protect their data in the DEEU.</p>
      <p>Unaware users. This group includes users
who do not have a sufficient level of knowledge
about information security measures when
working on the network. They may not be
aware of the risks associated with opening
suspicious links, and they may not be familiar
with the rules for using public Wi-Fi networks
in the DEEU. Such users install untrustworthy
software without fear and often transmit
confidential data through unsecured
communication channels.</p>
      <p>Indifferent users. This group includes users
who do not show any interest in information
security issues on the university network and
who do not adhere to basic information security
measures.</p>
      <p>Irresponsible users. This group includes
users of the DEEU who violate the rules and
policies of information security on the
university network. They may attempt to gain
unauthorized access to the DEEU, distribute
malware, violate data confidentiality, or engage
in fraudulent activities within the DEEU.</p>
      <p>The above categorization of user types is
rather arbitrary. As noted in [15], there are no
clear boundaries between the mentioned
categories of users. As they gain knowledge, for
example through relevant courses in university
curricula, users may move from one type to
another, recognizing the importance of online
information security and taking appropriate
measures to protect their data and accounts.</p>
      <p>Then in the matrix MSn×k, a certain number
is placed in place msij(i∈1, …, n; j∈1, …, k) if the
user of the DEEU (ui) is assigned to a certain
group (sj), based on the style of his behavior in
the DEEU in the context of compliance with
information security rules.</p>
      <p>In effect, this matrix displays data related to
the information security competencies of
students and employees. In a digitized form,
such a matrix may contain, for example, the
behavior style of a student or employee in
information security matters. Such data has
been obtained based on the analysis of the DT,
e.g. using the methodology given in [16, 17].</p>
      <p>Otherwise, i.e. when the IS style assessment is
not performed, the space remains empty.</p>
      <p>It is required to find vectors ( ̂ ), ( ̂ )
containing data about:
1. In the context of the formation of an
individual educational trajectory of
already known assessments of the user
(ui), i.e. ( ̂ ). Also estimated estimates—
(̂ ).
2. In the context of developing skills for safe
work in the DEEU of already known
skills, for example, based on the DT or
testing results, i.e. ( ̂ ). Also estimated
assessments, after the acquisition, of the
relevant competencies in information
security—( ̂ ).</p>
      <p>Since one of the research objectives was to
develop an algorithm for DSS, Matrix
Factorization (MF) was used as a machine
learning method. MF meant the decomposition
of the original matrix into the product of two
matrices of small rank [18, 19]. Accordingly,
the interaction of users with an object will be
modeled as a scalar product of vectors of
representation of users and objects in a factor
space relating, for example, to the
competencies of students in information
security issues. Note that factorization models
have proven themselves well when working
with highly sparse matrices [18, 19]. This is
because MF allows you to extract hidden
dependencies based on the analysis of users’
DT in the DEEU and make predictions based on
large volumes of information circulating in any
educational institution.</p>
      <p>In the context of machine learning, DSS MF
can be used, for example, for the tasks of
developing recommendations related both to
improving the quality of the educational
process as a whole and to individual
competencies of students and employees, for
example in information security.</p>
      <p>Since working with matrices is similar, in
the context of this study we consider only the
algorithm for working with the matrix of
student assessments in the DEEU, see Table 1
and Fig. 1.</p>
      <p>Let us present the assessment matrix MEn×m
as a product of two matrices:</p>
      <p>Matrix An×w, which includes a numerical
description of hidden (latent) characteristics of
users (for example, behavioral patterns:
regularity of activity in the DEEU, frequency
and time of entry into the DEEU, typical activity
intervals; content consumption; access level,
etc., frequency of erroneous logins, attempts to
access prohibited resources, etc., as well as
explicit ones (course, age, average grades, etc.).</p>
      <p>Matrix Bw×u, which characterizes
educational tasks, for example, the priority of
courses in IT and/or information security for
the formation of an individual educational
trajectory.</p>
      <p>We fill in random variables based on the law
of uniform distribution on the interval
0; maxmeij / k </p>
      <p>of the latent characteristics
for, respectively, the matrices A and B.</p>
      <p>Then solve the minimization problem using
the dependence (1):
argmin ME − M^E + B +  A ,
(1)
where ME is the matrix that is obtained as a
result of approximation from the matrices A
and B, α, β which are algorithm parameters.</p>
      <p>At each step of the iterative algorithm, error
minimization will include the following steps
presented in Table 1 and Fig. 1.
As the volume of data obtained increases, and
therefore the data sparsity decreases, an
increase in the number of iterations may be
required. Control of the number of iterations
can be automated. Currently, the development
of appropriate software is underway, with the
help of which, after factorization and
comparison of the accuracy of predictions with
past results, it will be possible to develop, using
DSS, to improve the quality of the educational
process, and, in particular, competencies in
information security. If the prediction accuracy
Air = Air − v(BrEj + Air ), where r 1,...,k,  − regulatory parameter. v − learning rate
^
 = me − me, j 1,...,m
Brj = Brj − v(AiEr + Brj )
decreases, the number of iterations should be
increased. Otherwise, the number of iterations,
see Fig. 1, will not change.</p>
      <p>As an alternative, the acceptable
factorization precision can be specified. If this
accuracy is achieved, then the algorithm shown
in Fig. 1 stops.
As indicated above, working with the second
matrix, concerning the categorization of user
types on information security issues, is similar.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>As part of the study, an algorithm was proposed
for a DSS that helps improve the quality of
education and the degree of security of the
DEEU based on the analysis of users’ DT. The
algorithm is based on matrix factorization of
users’ DT in the DEEU. The proposed solution
allows us to mitigate the problem of developing
the competency profile of students and
employees, primarily in matters of acquiring IS
skills. This, in our opinion, generally
contributes to increasing the degree of security
of the central communication system.
Mastering new competencies related to
information security issues expands the profile
of not only students but also university
employees. This, ultimately, contributes to the
formation of future specialists who have a
proactive position in information security
issues and are capable of self-organization in
this subject area. It is shown that the
implementation of artificial intelligence
methods in such DSS can be realized based on
machine learning using matrix factorization.
The implementation of such intellectual tools
in such DSS will make it possible to
qualitatively select educational material, in
particular, on information security issues. Such
material will be of interest to students since it
is focused on their characteristics and will
involve them in the learning process as much
as possible.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgments</title>
      <p>The work was carried out within the
framework of grant research IRN AR 19678846
“Increasing the efficiency of hybrid and
distance forms of organizing the educational
process based on the development of
university infrastructure in the context of
digital transformation” (Republic of
Kazakhstan).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Muydinovich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Valentinovna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Xabibjonqizi</surname>
          </string-name>
          ,
          <article-title>The Role of Information Technology in Modern Methods in the System of Higher Education, Int</article-title>
          .
          <source>J. Early Child. Spec. Educ</source>
          .
          <volume>14</volume>
          (
          <issue>7</issue>
          ) (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <issue>Health Sport 7</issue>
          (
          <issue>2</issue>
          ) (
          <year>2017</year>
          )
          <fpage>765</fpage>
          -
          <lpage>775</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Haleem</surname>
          </string-name>
          , et al.,
          <article-title>Understanding the Role of Digital Technologies in Education: A review</article-title>
          ,
          <source>Sustainable Operations and Computers</source>
          <volume>3</volume>
          (
          <year>2022</year>
          )
          <fpage>275</fpage>
          -
          <lpage>285</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.susoc.
          <year>2022</year>
          .
          <volume>05</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of Active Cybersecurity Education in Ukrainian Higher School</article-title>
          , Information Technology for Education,
          <source>Science, and Technics</source>
          , vol.
          <volume>178</volume>
          (
          <year>2023</year>
          )
          <fpage>533</fpage>
          -
          <lpage>551</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -35467- 0_
          <fpage>32</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Implementation of Active Learning in the Master's Program on Cybersecurity</article-title>
          , [14]
          <string-name>
            <given-names>K.</given-names>
            <surname>Subramanian</surname>
          </string-name>
          ,
          <article-title>Introducing the Splunk Advances in Computer Science for Platform, Practical Splunk Search Engineering and Education II, vol</article-title>
          .
          <source>Processing Language</source>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>938</volume>
          (
          <year>2020</year>
          )
          <fpage>610</fpage>
          -
          <lpage>624</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-1-
          <fpage>4842</fpage>
          -6276-
          <issue>4</issue>
          _
          <fpage>1</fpage>
          .
          <fpage>10</fpage>
          .1007/978-3-
          <fpage>030</fpage>
          -16621-2_
          <fpage>57</fpage>
          . [15]
          <string-name>
            <given-names>K.</given-names>
            <surname>Shu</surname>
          </string-name>
          , et al.,
          <article-title>The Role of User Profiles for [6]</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Vaccari</surname>
          </string-name>
          , et al.,
          <source>Towards the Fake News Detection</source>
          ,
          <source>International SocioScope: An Information System for Conference on Advances in Social the Study of Social Dynamics Through Networks Analysis and Mining</source>
          (
          <year>2019</year>
          )
          <article-title>Digital Traces</article-title>
          ,
          <source>17th ACM SIGSPATIAL 436-439. doi: 10.1145/3341161.33429 International Conference on Advances in 27.</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Marusenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , Social Engineering Penetration Testing in Higher Education Institutions, Advances in Computer Science for Engineering and
          <string-name>
            <surname>Education</surname>
            <given-names>VI</given-names>
          </string-name>
          , vol.
          <volume>181</volume>
          (
          <year>2023</year>
          )
          <fpage>1132</fpage>
          -
          <lpage>1147</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -36118-0_
          <fpage>96</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Marusenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <article-title>Experimental Evaluation of Phishing Attack on High School Students, Advances in Computer Science for Engineering and Education III, vol</article-title>
          .
          <volume>1247</volume>
          (
          <year>2020</year>
          )
          <fpage>668</fpage>
          -
          <lpage>680</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -55506-1_
          <fpage>59</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Aarthi</surname>
          </string-name>
          ,
          <article-title>Using Users Profiling to Identifying an Attacks</article-title>
          ,
          <source>Turkish J. Comput. Math. Educ</source>
          .
          <volume>12</volume>
          (
          <issue>7</issue>
          ) (
          <year>2021</year>
          )
          <fpage>795</fpage>
          -
          <lpage>802</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>