You are on page 1of 8

J Comput Virol Hack Tech

DOI 10.1007/s11416-017-0305-7

ORIGINAL PAPER

A performance evaluation of information security training


in public sector
Sung-Kyu Park1 · Song-Ha Lee2 · Taek-Young Kim2 · Hyo-Jung Jun2 ·
Tae-Sung Kim2

Received: 3 March 2017 / Accepted: 24 July 2017


© Springer-Verlag France SAS 2017

Abstract Recently, as the incidents of the security breach the domestic and overseas education and training, this study
and the personal information leakage in public institutions drew a model that can apply.
and the major information/communication infrastructure
have increased, the importance of the development and train- Keywords Evaluation training · Cybersecurity · Education
ing of human resources specialized in cybersecurity, who can program · Return on investment
immediately respond to this are emphasized. Accordingly,
the government has announced policies for the development
of human resources, established and operated public sector 1 Introduction
cybersecurity training centers; however, there is no method
for understanding the investment performance and effect of With the development of intelligent and automated vulnera-
the present cybersecurity education/training in the public sec- bility attack (or analysis) and hacking skill, security breach
tor. For the establishment of a training system and the quality incident and personal information leakage increase [9]. In
control of continuing education, a method for evaluating the addition, concern over the occurrence of security risks in the
performance of the training is needed, and this can prove the environments, such as Internet of Things, big data, Cloud
justification of the promotion of the training program and the and Mobile increases [1,19]. Thus, as demand for the infor-
sustainability of the training center. The goal of this study is to mation security professional manpower, who can respond
analyze the outcome of education and training in the field of to them immediately, increase, the importance of education
information security and economic return on investment. For and training of manpower is emphasized [12]. Especially,
this purpose, through literature research on the outcome of the necessity of the promotion of awareness and education
for the manpower who takes full charge of the information
B Tae-Sung Kim security of the communication-based facilities of a coun-
kimts@chungbuk.ac.kr try and public institutions is emphasized. In the domestic
Sung-Kyu Park public sector, there are problems such as the absence of a
parksk0606@gmail.com department taking full charge of information security, the
Song-Ha Lee lack of manpower and the limit of the manpower’s exper-
lsh914@naver.com tise while the rate of the implementation of education and
Taek-Young Kim training of each institution is 14.9% as of 2015, which is sig-
ecac5732@naver.com nificantly low [11]. Accordingly, the government announced
Hyo-Jung Jun various policies for the training of manpower specialized in
phdhyo@naver.com information security. To realize the manpower development
1 Cybersecurity Economics Research Institute, Chungbuk
policy, the government carries out education and training
National University, Cheongju, Republic of Korea of manpower in charge of the information security of pub-
2 Department of Management Information Systems, and
lic institutions through educational institutions specialized
Cybersecurity Economics Research Institute, Chungbuk in public information security. In promoting the awareness
National University, Cheongju, Republic of Korea of information security and improving the capability level,

123
S. Park et al.

such as knowledge, skill and attitude necessary for business, the whole training process, and a result-oriented model that
the role of the educational institution is important. Educa- evaluates the results of training.
tional institutions need to make efforts such as contacting
lecturers through securing budgets, constructing educational
facilities and infrastructure and developing an educational 2.1 Training process-oriented evaluation model
curriculum in order to perform the roles in the training and
education of manpower. Since education is operated through The IPO model by Bushnell [5] categorized each sub-
education investment such as certain manpower and bud- domain, considering the characteristics of the education and
gets by the persons in charge of the education, there is a training program through the level of evaluations of Element
need for a method of evaluating the performance accord- (Input), Process and Output in the education and training
ing to the target of the operation of educational institutions. process and then, presented a model that would carry out an
Analyzing the effects such as the costs invested in informa- overall evaluation. Stufflebeam [3] defined the process that
tion security training, the lecturers’ capability, educational designs, obtains and provides the information necessary for
facilities, educational contents and methods, students’ satis- decision-making through evaluation and proposed a Context-
faction and how much they apply the contents they learned Input-Process-Performance (CIPP) evaluation model based
through education to their job and understanding the effects on this. The CIPP model is concerned with the content and
as compared to investments in education can be important character of decision-making and emphasizes the role of the
information that can improve the overall process of the oper- evaluation responding to that. Lee & Cha [6] applied the
ation of the education in addition to the simple estimation CIPP model to civil servants in local governments, who par-
of monetary values. Moreover, presenting the contribution ticipated in personal information security training. A research
decision-making and education concerning the sustainabil- model and hypotheses were set up, which consisted of input,
ity of the information security education carried out in the process, and output. And relationships among them were
public sector to the goals and objectives of the organization analyzed. Effectiveness of education was composed of the
can justify its validity. The goal of this study is to analyze the transfer of learning and satisfaction and the interest of the
outcome of education and training in the field of information head of an organization was used as a moderating effect.
security and economic return on investment. For this purpose, The result of the study suggested that the effectiveness of
through literature research on the outcome of the domestic personal information security education is affected by the
and overseas education and training, this study drew a model input and process of the education and that the interest
that can apply. and leadership for education of the head of an organiza-
In Sect. 2 of the paper, we review the related work about tion could further strengthen the relationship between them
evaluation model of education and training. In Sect. 3, we (input-effectiveness) in a positive direction. Lee et al. [7]
propose Phillips ROI methodology’s evaluation process. In conducted a survey with capital areas civil servants of the
Sect. 4, survey was conducted with the persons in charge primary local government who had an experience of tak-
of public institution security, who took the curriculum of ing personal information security education and taking the
“Strengthening Cyber Security Capability” of the educa- reaction (Satisfaction with the education) to the performance
tional institution and applied to the model. of personal information security education and learning-
behavior-business performance as factors and verified the
hypothesis of the relationship among them, using Structured
2 Literature review Equation Model (SEM). For an evaluation of Context-Input-
Reaction-Outcome (CIRO) model developed by Warr et al.
An evaluation of the effect of training is process of diagnosis [16], a model which comprehensively evaluates the context,
and evaluating the overall processes of the program, continu- reaction and outcome of the introduction of a program was
ously improving the curriculum and proving the justification proposed. The logic model proposed by McLaughan & Jor-
of the promotion of the training program and its sustainability dan [8] includes the factors, including the input, process,
through analysis of management performance because of the output, outcome and external influence of a program. The
training and the economic effect. This is a process of analyz- logic model proposed by Wholey consists of two main parts,
ing the effects, such as the costs invested in the cybersecurity the program components and the purpose and effect of the
training, the instructors’ competency, the facilities, contents program. Program logic includes “the logic implied in the
and methods of the training, the participant’s satisfaction and program,” “program components and the achievement of the
the extent of the application of the contents learned through goal intended by the program” and “causal relationship con-
the training to the present operations. The evaluation model nected to the creation of outcome, accordingly”. Grossman &
related to the effectiveness of the education and training pro- Salas [14] utilized the transfer process model for an analysis
gram is divided into a process-oriented model that evaluates in order to draw the elements affecting the training transfer,

123
A performance evaluation of information security training in public sector

such as a positive effect or negative effect when the contents analyzed, and a procedural ROI 8-level model was proposed.
learned after training is used in a similar environment. Sorensen [17] applied Philips’s model to measure the eco-
nomic effect of the training process of Bosnia & Herzegovina
2.2 Training result-based evaluation model local governments (Project cycle management curriculum)
and utilized it in data analysis, using questionnaires. As
Kirkpatrick [4] composed the model of the outcome of criteria for analyzing business performance, the number of
education and training program with four steps, including project announcements requested for institutions, the num-
reaction, learning, behavior and result. Reaction means the ber of projects submitted and the number of projects adopted
satisfaction with an education among the students who par- and receiving budgets were compared. As major effect factors
ticipated in an education, and the elements of satisfaction for the estimation of ROI, Time Saving and Effect of Project
include educational contents and method, education time Implementation were selected for the proposal for a project,
and materials, lecturer, educational facilities and environ- and the ROI result value was estimated through the partic-
ment, and education operation services. Learning refers to ipant’s estimation method. Rafiq [13] applied and utilized
changes in the capabilities such as knowledge, skill and atti- Kirkpatrick’s model with a PIA training center to evaluate
tude obtained by the students through the education, which an organization’s training in an analysis. The model used in
figures out the degree of the achievement of the goal of aca- the study was applied, predicting that the effect of education
demic achievement set up in advance by the participants in would gradually increase and assumed that a positive effect
the education. For evaluations of behavior and result, three would be created as students get support for training from
to six months after the completion of the education is sug- the organization. Curado & Martins Teixeira [2] improved
gested as the most appropriate time for the evaluation of the and applied Kirkpatrick model in order to draw the training
changes. Behavior evaluation means the practical utilization evaluation level and ROI. The model was utilized, apply-
of the learned contents in the job, which measures changes ing small-scale logistics companies to an analysis by adding
in job behavior according to the education and the transfer personal factors, environmental factors and motivational ele-
of learning. The result means the evaluation of the positive ments to the model. Personal factors include confidence and
impacts of the factors of reaction, learning and behavior the organization’s ability to perform while environmental
on organizational performance. The U.S. NIST developed factors consist of the organization’s support, learning culture
NIST 800-16 “A role-based model for federal informa- and business constraint. Motivational elements include atti-
tion technology/cybersecurity training” as guidelines for the tudes towards career and job, relationships of organizations
development of human resources for information security in and opportunities for training decisions.
public sector in 2014. NIST 800-16 described the method of
training needs analysis and evaluation and examples apply-
ing the Kirkpatrick Model [15]. Phillips’s [10] evaluation 3 Research method
model is a model developed by improving Kirkpatrick’s 4-
step model, which focuses on Return on Investment (ROI) The process of the evaluation of the effect of the training
and four-step result evaluation in Kirkpatrick’s model was in the cybersecurity sector in this study broadly consists of
divided into the contribution of the education to business four steps. In the step of evaluation planning, the goal of the
outcome (Business Impact) and ROI. The ROI of education evaluation of the training set up, and an evaluation plan is
means the value created by comparing the net profit created established. The evaluation plan is to understanding training
through education with the cost invested in the education. needs, using training needs analysis. In the step of data collec-
ROI is the value considering the net profit from education tion, the method and period of data collection are decided,
and training, different from Benefit-Cost Ratio (BCR) con- according to the training cycle (pre-, mid-, and post-). In
sidering the entire benefit from the education and training. the step of data analysis, the company’s tangible/intangible
He suggested a model that supplemented the weakness of the performances are analyzed, and the conversion of monetary
existing models that they could not prove the financial effect value are applied, and finally, the costs put in the curriculum
of the education and training program. Kirkpatrick’s and are calculated to draw ROI value. In the step of reporting is a
Phillips’s models are result-based, which conducts an educa- step in which improvements of the training are drawn based
tion and evaluates its effect, and models that are sequential by on the results of the process evaluation.
each step, and assume positive correlations. Goh [18] mea-
sured the economic effect of education, conducting a survey 3.1 Evaluation planning
with 162 persons who participated in an e-learning program
to strengthen the job capability of the leaders of the busi- The training evaluation process was composed of five levels,
ness team of a domestic home-study materials company. For including reaction & satisfaction, academic achievement, job
this purpose, Kirkpatrick’s model and Phillips’ model were application, a contribution to performance, ROI estimation

123
S. Park et al.

Fig. 1 Evaluation process

(Fig. 1) and evaluations were carried out through surveys. tutions, who participated in the education for strengthening
The first survey included Training Needs Analysis, Level 1 cyber security capability. From June 13 through September
Reaction & Satisfaction survey and Level 2 Measurement of 23, 2016 when the curriculum was in progress, the first survey
Academic Achievement, and the items on the survey were set was conducted at the time of the completion of the curricu-
up according to the objectives of the curriculum. The items lum. The second survey was conducted three months later on
of the reaction & satisfaction survey include the relevance of the date of the completion of the curriculum in October 2016.
the curriculum with the job, the importance of the curriculum The first survey (Reaction & satisfaction, academic achieve-
in business performance, the application of the curriculum to ment) distributed questionnaires via e-mail, and 119 copies
the job, the newness of education materials, the level of dif- in total were collected, and the second survey was conducted
ficulty in the curriculum, whether to take the training again three months later. Questionnaires were distributed to 57 per-
and whether to recommend it to coworkers. The items of sons, and 13 copies in total were collected for the use in an
the academic achievement survey were set up as security analysis.
awareness and understanding, job-related IT/cyber security
knowledge, specialized skills (Technological and manage-
3.3 Data analysis
rial, etc.), tool application and attitude and ability for the
job. Level 3 Job Application is to measure how well they
At the level of data analysis, to isolate the effect of educa-
utilize the contents learned in the training and has the same
tion on business performance measured through the second
items as the Level 2 survey, and three months later, they
survey, the participant’s estimation method was used. The
were measured through the second survey and compared with
participant’s estimation method is a method of obtaining
the results of the first survey. The items in the survey were
direct information from the students who had an education,
used based on a seven-point Likert scale. In Level 4, for
and it applies under the premise that the students who par-
contribution to performance, business performance through
ticipated in the education themselves may have an ability to
education was divided into individual performances and busi-
estimate or determine the change of business performance
ness performances. The individual performances were set
through the education with a higher reliability than persons
up as the improvement of job satisfaction, the decrease of
outside, who did not. To convert the isolated educational
job stress, the improvement of teamwork, the increase of the
performance to a monetary value, the benefit was estimated
contribution to the organization and the improvement of com-
through the productivity improvement indicator of the busi-
munication ability. The business performances were set up
ness performance indicators and the costs invested in the
and measured by the decrease of withdrawal of manpower,
education program were drawn through an interview with
the improvement of productivity and the decrease of the risk
operators of educational institutions.
level (Table 1).
ROI calculation is Equation (1).
3.2 Data collection
T otal Pr ogram Bene f it − T otal Pr ogram Cost
ROI = ×100
This study conducted an evaluation with the holders of a T otal Pr ogram Cost
position in the organization taking full charge of public insti- (1)

123
A performance evaluation of information security training in public sector

Table 1 Training evaluation


Level Phillips ROI method Description Kirkpatrick model
process (Phillips ROI method
versus Kirkpatrick model) 1 Reaction & planned action Measures participant satisfaction with the Reaction
program and captures planned action
2 Learning Measures changes in knowledge, skills, Learning
and attitudes
3 Job application Measures changes in on-the-job behavior Behavior
and progress with application
4 Business impact Captures changes in business impact Results
measures
5 Return on investment Compares program monetary benefits to
the program costs

Table 2 Reaction & planned action data tents were in the first place (38.5%), and for learning barriers,
No Measures Score enough time and environment for job application were in the
first place (33.4%) (Tables 3, 4).
1 Importance of educational contents in business 5.55
2 Up-to-dateness of educational contents 5.51 4.3 Business impact (level 4)
3 Relevance of education materials for business 5.26
4 Level of difficulty in educational contents 4.01 For individual performance through education, most respon-
5 Willingness to take again 6.16 dents responded that job satisfaction improved (5.7 points),
6 Willingness to recommend 6.00 followed by the increase of the contribution to the orga-
Average 5.41 nization (5.4). For the organization performance measured
through the participants’ estimation method, the respon-
dents responded that the improvement of productivity had
the biggest impact on the organizational performance, and
4 Evaluation: an illustrative example
they responded that the education contributed about 55.4%
to the improvement of productivity. Along with this, they
4.1 Reaction & planned action (level 1)
responded that education made a contribution of about
54% to the reduction of risk level, another organization
As a result of measurement of items in Lv1 evaluation on
performance, too, but for the decrease of withdrawal of
a seven-point scale, the overall satisfaction was high (5.41
manpower, the education’s contribution was 39.2%, which
points on average). Especially, willingness to take the cur-
was somewhat low. The qualitative educational performance
riculum again (6.16) and willingness to recommend (6.00)
suggested by the students included the promotion of infor-
were the highest. On the other hand, it was found that most
mation security awareness, the improvement of individual
of them were unsatisfied with the level of difficulty in edu-
business ability and the improvement of the organization’s
cational contents (4.01) (Table 2).
security level. The average time for which the respondents
performed information security business was 3.7 hours,
4.2 Learning & job application (level 2 & 3) and the time of the information security business reduced
after the education was 7.9 hours a month on average (per
Academic achievement (Learning) was 5.43 on average, and day). For the desirable hours of education and training,
security awareness and understanding were the highest (6.0). they wanted 45 hours a year (about 6 days) and 1.6 mil-
In contrast, achievement of tool application (Software and lion won a year as an educational support fund (Tables 5,
hardware, etc.) was the lowest (4.71). For the job applica- 6).
tion measured three months later after the completion of
education, security awareness and understanding were the 4.4 Return on investment (ROI, level 5)
highest (6.0). For the job application, too, tool application
was the lowest (4.2). For the job knowledge learned through Before the estimation of monetary benefits according to edu-
the curriculum, job application improved by 0.1 while for cation, the effect of education on organizational performance
the remaining 4 items, job application was low. For the job indicators was isolated, using the participants’ estimation
application facilitators, the suitability of learning contents method. It was found that the indicator with the highest
with the job and the usability and newness of learning con- effect of education on organizational performance indica-

123
S. Park et al.

Table 3 Learning & job


No Measures Learning (after the com- Job application Gap
application data
pletion of education) (3 month later)

1 Security awareness/understanding 6.0 6.0 0.0


2 Job knowledge 5.7 5.8 +0.1
3 Specialized skills 5.13 5.1 −0.03
4 Tool application (software/hardware) 4.71 4.2 −0.51
5 Job attitude 5.65 5.6 −0.05
Average 5.43 5.34 −0.09

Table 4 Factors affecting job


No Factors (support/lack) Facilitators (%) Barriers (%)
application (facilitators and
barriers) 1 Senior officer’s continuous feedback 15.3 0
2 The management’s interest, support and backing 7.7 33.4
3 Usability and newness of learning contents 38.5 0
4 Suitability of learning contents for the job 38.5 8.3
5 Sufficient time and environment for job application 0 50
6 Other (no barriers, etc.) 0 8.3

Table 5 Individual performance according to security training (intan- Total Monetary Beneit = 10,855,938 Total Cost = 1,193,634
gible)

No Individual performance Score ROI = × 100
1 Improvement of job satisfaction 5.7 10,855,938−1,193,634
= × 100 = 809%
2 Decrease of job stress 5.0 1,193,634
3 Improvement of teamwork 4.5
4 Increase of contribution to the organization 5.4
5 Improvement of communication ability 5.1 Fig. 2 ROI value
Average 5.14

education program consist of the lecturer cost, educational


tors was the “job productivity” indicator (20.6%). This study preparation cost, textbook publication cost, meeting cost and
analyzed the educational monetary benefit of the job produc- reserve fund. As a result of an interview with the operators
tivity indicator. As a result of the analysis, monetary benefit of educational institutions, the cost per person was 91,818
of 10,855,938 won was produced in total, and the mone- won. When that was converted to 13 persons, the cost was
tary benefit from the improvement of job productivity was 1,193,634 won. When the curriculum was operated with 13
835,072 won on average per person. The costs invested in the persons, the ROI was 809% (Fig. 2, Table 7).

Table 6 Organization performance according to security training


No Organization performance Indicator 1. decrease of Indicator 2. improvement of Indicator 3. decrease of
indicators withdrawal of manpower job productivity (%) risk level (%)
(%)

1 Contribution of indicator improvement to 43.1 51.9 50.4


organization performance
2 Educational contribution to indicator 39.2 55.4 54.0
change
3 Reliability of the estimated contribution 61.9 71.9 65.0
Isolated effect of education 10.4 20.6 17.6
Effect of education = organization performance change × education contribution × reliability of estimation

123
A performance evaluation of information security training in public sector

Table 7 Estimation of monetary benefit of education


No Reduced business Annual personnel Change of organization performance Participants’ Reliability of the Monetary
hours expenses (reduced personnel expenses) estimation (%) participant’s esti- benefit
mation (%)

1 15 42,500 3,988,375 40 40 637,500


2 0 65,600 0 30 95 0
3 2 65,000 812,500 70 70 398,125
4 3 27,500 515,625 40 80 165,000
5 0 27,500 0 90 90 0
6 2 42,500 531,250 0 100 0
7 40 42,500 10,625,000 50 60 3,187,500
8 16 65,000 6,500,000 80 80 4,160,000
9 5 27,500 859,375 80 20 137,500
10 10 27,500 1,718,750 70 70 842,188
11 10 42,500 2,656,250 50 100 1,328,125
12 0 42,500 0 40 40 0
13 0 65,000 0 80 90 0
Total 10,855,938

5 Conclusions general performance indicator that came under all training.


In the future, it would be necessary to conduct additional
This study proposed a research method that applies a model research in order to draw key performance indicator of the
for the evaluation of the effect of information security train- information security organization of public institutions and
ing and carried out evaluations with the holders of a position to understand the factors of training affecting the business
in the organization taking full charge of security in public performance of public institutions.
institutions through surveys. The educational performance
model aims to diagnose the overall training process and Acknowledgements This research was supported by the Basic Sci-
ence Research Program through the National Research Foundation
draw improvements, instead of simply estimating micro- of Korea funded by the Korean Government (NRF-2011-0025512).
scopic ROI in training. Accordingly, by diagnosing each This work was supported by the Ministry of Education of the Repub-
level of educational satisfaction, academic achievement, job lic of Korea and the National Research Foundation of Korea (NRF-
application, business performance and ROI, improvements 2015S1A5A2A01009763). This study was carried out with the support
of ‘R&D Program for Forestry Technology (Project No. 2016004C10-
in the operation of the curriculum can be drawn based on the 1619-AB01)’ provided by Korea Forest Service.
result of an analysis. In addition, in order to understand the
application of knowledge, skill and ability learned through
an education to the job, educational institutions should carry
out the follow-up management of students. When the model
proposed in the study applies, an evaluation of systematic References
education and training would help improve the level of pub-
1. Lee, A.: Authentication scheme for smart learning system in the
lic sector information security manpower and promote the cloud computing environment. J. Comput. Virol. Hacking Tech.
national information security competitiveness. In this study, 11(3), 149–155 (2015)
we investigated the effect of information security training 2. Curado, C., Martins Teixeira, S.: Training evaluation levels and
support on business performance. In order to grasp the growth ROI: the case of small logistics company. Eur. J. Train. Dev. 38(9),
845–870 (2014)
rate of business performance, we have found the rate of 3. Stufflebeam, D.L.: Toward a Science of Educational Evaluation.
change of ‘job productivity’ indicator and used it in an anal- Educational Technology Publication, Englewood Cliffs (1973)
ysis of the ROI in training. The key factor in the evaluation of 4. Kirkpatrick, D., Kirkpatrick, J.: Evaluating Training Program: The
the effectiveness of training is not simply to derive the score Four Levels, 3rd edn. Berrett-Koehler Publishers, San Francisco
(2006)
(ROI), but to ‘improve the problem by checking the overall 5. Bushnell, D.S.: Input, process, output: a model for evaluating train-
process of education’. Based on the results of this study, we ing. Train. Dev. J. 44(3), 41–44 (1990)
aim to contribute to the training of high-skilled information 6. Lee, H.J., Cha, Y.J.: A study on the effectiveness of privacy edu-
security personnel in the public sector by improving the qual- cation using the CIPP model: focusing on the perceptions of local
government officials. Korean J. Local Gov. Stud. 19(1), 95–119
ity of training. The limitation of this study is that it used a (2015)

123
S. Park et al.

7. Lee, H.J., Lee, H.C., Cha, Y.J.: A study on the performance of pri- 14. Grossman, R., Salas, E.: The transfer of training: what really mat-
vacy education in local government: focused on Kirkpatrick model. ters. Int. J. Train. Dev. 15(2), 103–120 (2011)
Korean J. Local Gov. Stud. 24(1), 173–196 (2015) 15. Toth, P., Klein, P.: A Role-Based Model for Federal Informa-
8. McLaughlin, J.A., Jordan, G.B.: Using logic models. In: Handbook tion Technology/Cybersecurity Training. NIST Special Publication
of practical program evaluation, pp. 7–32. Jossey-Bass Inc., San 800-16, Gaithersburg (2014)
Francisco (2004) 16. Warr, P., Bird, M., Rackham, N.: Evaluation of Management Train-
9. Kim, J.H., Lee, K.H.: Vulnerabilities of intelligent automobiles ing. Gower Press, London (1970)
using TPEG update based on T-DMB and its countermeasures. J. 17. Sorensen, S.E.: Comprehensive return on investment evalua-
Comput. Virol. Hacking Tech. 11(3), 143–148 (2015) tion system for local self-government training in Bosnia and
10. Phillips, J.J.: Handbook of Training Evaluation and Measurement Herzegovina—case: project cycle management course. Perform.
Methods. Routledge, New York (1997) Improv. 54(1), 14–27 (2015)
11. Korea Internet & Security Agency: National information security 18. Goh, Y.S.: Design of the procedural ROI process model for human
white paper. Ministry of Science, ICT and Future Planning (2016) resource programs. Korean Soc. Educ. Technol. 21(2), 153–186
12. Choi, M.K., Han, K.S.: A study on the service quality of SMEs (2005)
management consulting affecting the perceived management per- 19. Kim, Y.T., Jeong, Y.S.: A token-based authentication security
formance in mobile communication environments. J. Comput. scheme for Hadoop distributed file system using elliptic curve cryp-
Virol. Hacking Tech. 10(2), 145–156 (2014) tography. J. Comput. Virol. Hacking Tech. 11(3), 137–142 (2015)
13. Rafiq, M.: Training evaluation in an organization using Kirkpatrick
model: a case study of PIA. J. Entrep. Organ. Manag. 4, 151 (2015)

123

You might also like