**13. References**


http://www.itp.net/586887-facebook-unveils-extent-of-cyber-attacks-on-site.

Greene, Tim, "Cybercrime costs rival those of illegal drug trafficking, *Network World*, Sept 7, 2011,

http://www.networkworld.com/news/2011/090711-cybercrime-250580.html.

running on a single vendor's equipment (Jajodia, et al, 2011). Much will depend on decision makers recognizing the threats and being willing to invest both intellectual and financial capital in understanding the risks and applying appropriate defensive

At this point in time, the outlook for cyber security is not as rosy as the authors would prefer. Attackers continue to find new ways to exploit weaknesses, while developers continue to fix the known problems and attempt to develop new operating systems and applications with fewer vulnerabilities. Because there is very ample motivation (the chance for success is high), and because the possibility of being caught is relatively low (the risk is not terribly high), the area of cyber security continues to attract many black hats with many

In many senses, it is just like physical (aka "kinetic") warfare. As soon as one side develops a new weapon, the other side begins to develop a counter-weapon or a work-around. Additionally, the more aggressive side continues to probe the target for all possible points of weakness, and exploits these weaknesses when found. History has shown that this cycle of probing, exploiting, developing, and counter-developing can continue *ad infinitum*. Our belief is that the white hats will continue to make life in the cyber-world tolerable, minimizing risk and continuing to make improvements that provide major advantages to offset the associated problems. It will take a great deal of effort by many parties to keep

Agresti, William W., "The Four Forces Shaping Cybersecurity", *Computer*, Feb 2010, pp 101-

Baker, Jill, et al., "Winning in Cyberspace: Air Force Space Command's Approach to

Enzer, Georgina, "Facebook unveils extent of cyber-attacks on site", *ITP.net*, Oct 30,

http://www.itp.net/586887-facebook-unveils-extent-of-cyber-attacks-on-site. Greene, Tim, "Cybercrime costs rival those of illegal drug trafficking, *Network World*, Sept 7,

http://www.networkworld.com/news/2011/090711-cybercrime-250580.html.

Defending the Air Force Network", *High Frontier*, v 7 #3, May 2011.

CSFI (Cyber Security Forum Inititive), "Project Cyber Dawn – Libya", Apr 17, 2011, www.unveillance.com/wp-content/.../Project\_Cyber\_Dawn\_Public.pdf.

BBC News Technology, "Porn site breached in hack attack", Mar 12, 2012, http://www.bbc.co.uk/news/technology-17339508.

Boyd, Clark, "Profile: Gary McKinnon", BBC News, July 30, 2008, http://news.bbc.co.uk/2/hi/technology/4715612.stm.

BCS Security Forum, *ISNOW*, Winter 2010, pp 6-13.

technologies.

motivations.

cyberspace widely useful.

**13. References** 

104.

2011,

2011,

**12. Conclusion** 

Hoover, J. Nicholas, "DARPA Boosts Cybersecurity Research Spending 50%", Information Week, Nov 7, 2011,

www.informationweek.com/news/government/security/231902495.


 http://blogs.technet.com/b/virtualization/archive/2011/02/09/windows-7-andwindows-server-2008-r2-sp1-add-new-virtualization-innovations.aspx


http://www.symantec.com/content/en/us/home\_homeoffice/html/ncr/.


www.informationweek.com/news/security/attacks/231900054.

Sebastien, M. (2011, 25 May, 2011). "Infrographic: Cost of Sony's data hack could reach \$24 billion." PR Daily. Retrieved 9/13/11, from http://www.prdaily.com/Main/Articles/Infographic\_Cost\_of\_Sonys\_data\_hack\_ could\_reach\_24\_8359.aspx.


http://attrition.org/security/rants/sony\_aka\_sownage.html.

U.C. Office, London, "The Cost of Cyber Crime", 2010.

**3**

 *Greece* 

**Development of an e-Learning**

Amalia Polydoropoulou and Maria A. Lambrou

 *Department of Shipping, Trade and Transport, Korai, Chios,* 

*University of the Aegean, Business School,* 

**Recommender System Using Discrete**

**Choice Models and Bayesian Theory:**

**A Pilot Case in the Shipping Industry** 

The field of e-learning and self-learning has rapidly evolved during the past decade mainly because of major advances in telecommunications and information technologies, in particular the widespread use of web and mobile applications. Furthermore, the work environment conditions in most industries have become extremely demanding and competitive; therefore various forms of life-long learning appear to play an important role for employees' career development, as well as for companies' productivity improvement and human resources' efficiency. The flexibility, and cost effectiveness that e-learning offers

In an environment with abundant educational and training institutions the development of efficient new procedures to better guide students or trainees for selecting suitable learning materials is a challenging and open issue. In particular, the development of efficient elearning recommender systems, such as an electronic training advisor who will help individuals in choosing the appropriate e-learning courses matching their particular characteristics, preferences and needs and based on their expected professional and personal development, is an open and promising research and development area (Adomavicius & Tuzhilin, 2005; Brusilovsky, 2002; Kim et al, 2009; Ricci & Werthner, 2006; Zanker &

An e-learning recommender system can help trainees overcome basic constraints that e-

the uncertainty and insecurity of the individuals that a particular educational offer will

 the difficulty of finding and choosing courses among a large number of courses offered by different institutions, universities and organizations, based on their individual

the perception regarding the lack of interesting content or relative courses per case;

have the best possible outcome related to their career objectives.

**1. Introduction** 

is very significant, in most cases.

Jessenitschnig, 2006;).

training needs;

learning users increasingly face:

Wikipedia, "Timeline of events involving Anonymous",

http://en.wikipedia.org/wiki/Timeline\_of\_events\_involving\_Anonymous.

Wright, John D., "Air Force Cyberspace Strategic Planning Factors", *High Frontier*, v 7 #3, May 2011.

YouTube, http://www.youtube.com/watch?v=h2br2\_twHfw, 2010
