Sunday, February 23, 2020
Growing trend in online education Research Paper
Growing trend in online education - Research Paper Example e and usage of computers started to decline and more focus was given to those devices which were more capable of ensuring communication between more than two individuals. For example, it was also intent that, in the clinical advancement, there should be electronic mechanism between patient, doctor, nurse and other medical staff who was directly or indirectly connected with the health of the patient. As a result of such expectations, the recent advancement in the shape of online education has not only facilitated the electronic communication between nursing students and health teaching hospitals facilities but also increased an opportunity for studying and learning through using the medium of the Internet. Overall, this transformation has considerably increased opportunities for online nursing learning and also enabled to adjust their routine study schedule as they want to. In the following parts of this paper, first description about online education has been provided. Moreover, this part also elaborates on the general significance of online education. Subsequently, Significance of online education for nursing students has also been provided. After that part, merits of online education has been included in which accessibility and affordability features have been mainly emphasized and elaborated as well. It is followed by demerits of online education part in which education quality and lack of concentration have been detailed. Before the conclusion part, the significance of magnet status for hospitals and the nursing students has been included. Online education is growing across the world (Shelton and Saltsman, 2005.p.146). Online education is defined as an education mechanism in which information communication technology is used for the purpose of studying different subjects. Fundamentally, there are three different activities used in the online education system: online education provider, medium and online education receivers (students). In addition, online
Friday, February 7, 2020
The current State of Security in Smartphone Term Paper
The current State of Security in Smartphone - Term Paper Example Mobile technology is the latest domain that has been exploited by malicious intent users, like hackers, intruders etc, to achieve personal gains from jeopardizing the security of the legitimate users. This paper shall address the prevailing security threats that are witnessed in Smartphone technology alongside the technologies that are used to protect the devices from such threats. 2. Security in Smartphone The security threats that revolved around computers have migrated into the Smartphone domain and causing heavy losses to the users. To highlight the relevance of security measures on smartphones, Cheng (2011) provided results from a survey that was conducted by McAfee in the current year. The survey revealed that malware instances for Android (one of the most common smartphones in the current times) have increased by a significant figure of 76% in the last four months. Malware is defined as any program or application that is developed for the purpose of performing illicit activiti es, such as Trojans, viruses and worms. Some of the examples of security threats in smartphones are given below: 2.1 Smishing Phishing attacks had been known to cause harm to personal computers but a similar security threat is prevailing in the current times that is directed to harm smartphone- smishing and vishing. Ruggiero and Foote (2011) stated that hackers use the conventional approach of sending fake messages or voicemails to the recipients and urge them to call a financial institution with the aim to update their security settings etc. Voicemail systems are activated on the respective fake hosts that record sensitive information of the recipient. 2.2 Baseband Hacking Hackers have invented ways to intercept cellular phone calls by making the chips and firmware compromised in the Smartphone. Cheng (2011) stated that the baseband processor of the phone is turned into a listening device and enables the hackers to record conversation taking place between the participants. This can serve to record sensitive information and thus be used for malicious intent. 2.3 Infected Applications Applications are the most attractive feature of smartphones since they allow an individual to perform a diverse range of operations, for example play games, browse the web etc. Applications have also become one of the most common modes of infecting smartphones with compromised programs, such as Trojans. Apple and Blackberry follow a procedure of screening the applications (that might be contributed by developers) before publishing them on their App stores; this approach makes them avoid many Trojan attacks that might be hidden in the programs. Android follows a different approach and does not perform any screening process on the applications. Chang (2011) stated that an Android application with the name of ââ¬Å"Steamy Windowâ⬠has the power to convert a Smartphone into a botnet zombie. Upon successful acquisition of control over the phone, the hacker can perform any desired operation, such as: Send messages to any contact Make the browser point to compromised sites that may facilitate the transmission of sensitive information. Block the receiving of messages. 2.4 Jailbreaking and Rooting Apple IPhone School (2010) explains jail breaking as the hacking activity of the iPhone, iPad and iPod that allows the individual to have access to the Unix file system. Jailbreaking an iPhone is analogous to rooting an Android phone. Ngo (2009) stated that
Subscribe to:
Posts (Atom)