@ARTICLE{Lakhno_Valerii_Electronic_2024, author={Lakhno, Valerii and Lakhno, Myroslav and Makulov, Kaiyrbek and Kryvoruchko, Olena and Desiatko, Alona and Chubaievskyi, Vitalii and Ishchuk, Dmytro and Kabylbekova, Viktoriya}, volume={vol. 70}, number={No 2}, journal={International Journal of Electronics and Telecommunications}, pages={405-412}, howpublished={online}, year={2024}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={In the article there are presented results of the study of the state of user competencies for different specialties of the university digital educational environment (UDEE) on issues related to information security (IS). The methods of cluster analysis and analysis of digital (electronic) traces (DT) of users are used. On the basis of analyzing the DTs of different groups of registered users in the UDEE, 6 types of users are identified. These types of users were a result of applying hierarchical classification and k-means method. Users were divided into appropriate clusters according to the criteria affecting IS risks. For each cluster, the UDEE IS expert can determine the probability of occurrence of high IS risk incidents and, accordingly, measures can be taken to address the causes of such incidents. The algorithms proposed in this study enable research during log file analysis aimed at identifying breaches of information security within the university's DEE.}, type={Article}, title={Electronic footprint analysis and cluster analysis techniques for information security risk research of university digital systems}, URL={http://journals.pan.pl/Content/131800/19-4504-Lakhno-sk.pdf}, doi={10.24425/ijet.2024.149559}, keywords={cluster analysis, digital footprints, hierarchical classification, k-means method, information security, risks, university digital educational environment}, }