In this rapidly growing era of technology, terrorist organizations do not ultimately depend on weapons, army, bombs, and lethal weapons to inflict terror. As the entire earth is developing at a rapid pace, so do the terrorists. The strategies adopted by them have become cannier and more sinister. In addition to that, they no longer involve in training, making tedious plans, undergoing physical training, and subjecting their allies to physical attacks. Rather, they impose serious threats by attacking their victims by vandalizing the online infrastructure. This can be done conveniently from any part of the globe, thus enabling them to use the dark side of the internet. This chapter focuses on digital terrorism attacks, its impact, and it furnishes certain methods for prevention.
Technology plays a vital role in the field of e-Learning in adult education curriculum. The intent for this chapter is to explore the implications for e-Learning in hopes to stimulate attention as it relates to the acquisition of knowledge and inferences for higher education practitioners and program designers in terms of the contexts of students, embedded technology, and faculty. Conquering the challenges facing technology implications in any educational system is vital and ideally this chapter offers a means of collective literature to increase the quite extensive and potentially overwhelming components of effective curriculum programs within the field of adult education, using embedded technology. This chapter highlights briefly some of the concepts and identifies simple and applicable suggestions for increasing effectiveness of embedded technology into higher education curriculum and adult education teaching.
Mobile Learning plays a vital role in the field of education technology. Technology changed from time to time from traditional method of teaching to e-learning and then now moved to m-learning (mobile-learning), but the concept of education remains the same. In this chapter the objective is to review the benefits and challenges of using mobile devices (m-learning) in class room in the field of educational technology. The term educational technology is the combination of education and technology. Technology changes from time to time with the development of digital technology, but education remains the same.
Background: The major challenge in engineering education is to educate and train the student's community with pedagogical practices in order to determine the notable skills to solve more complex and fragile structured problems. Innovative pedagogical practices make the students to adhere to the complex formulations of the corresponding domain and its applications. The realm of good understanding of knowledge and its deliverables can be ascertained through pedagogical practices with a focus on learner-centric activities in the classroom teaching. The actual target in teaching learning process is to make all the students to have a good exploration on the domain knowledge with success ratio. The learner success is considered to be the core metric with which we can judge the success of learner-centric activities with creativity and quality processes. Confirming the process in which the learners are engaged with the key ideas of the course to be taught makes the students to have practical implementations in Teaching-Learning process. Objective: This research work focus on the assessment and evaluation of learner-centric techniques for outcome based education upon statistical evaluation. Students of third year (VI Semester) of two consecutive batches have been analyzed for the course on Information Retrieval (14ITPS0). Two set of batches 2015-19 and 2016-20 have been considered for the assessment and analysis of Active Learning Strategies (ALS). The incorporation has been processed using the strategic approach based on daily, weekly and monthly assessments focusing on student learning criteria and their responding behaviors for 2016-20 batch. Each paradigm has been measured corresponding to the course outcomes at each level. Significant statistical analysis has been made for validating the process behind the teaching learning process. Real time case study: Considering the batch 2015-19 summary assignments, presentations has been used for the evaluation and assessment of interim assignments. The observed response from the students went well among the student's community. All the students have been registered for the course and they too have completed the same. But, the time and success ratio in learning mechanism varied from student to student upon completion of the course. Considering the batch 2016-20 active learning strategies such as Quiz by Kahoot!, Flipped classroom activity and MOOCs course has been incorporated. Also, for MOOC'S online courses a set of two courses has been identified relevant to the subject of study such as Text Retrieval and Search engines & Text mining and Analytics. For the Research problem identification the students are allowed to choose the domain specific topics for the course on information retrieval. In this process the time and success ratio has also been observed it also varied from one student to another.
The importance of big data over analytics made the process of solving various real-world problems simpler. The big data and data science tool box provided a realm of data preparation, data analysis, implementation process, and solutions. Data connections over any data source, data preparation for analysis has been made simple with the availability of tremendous tools in data analytics package. Some of the analytical tools include R programming, python programming, rapid analytics, and weka. The patterns and the granularity over the observed data can be fetched with the visualizations and data observations. This chapter provides an insight regarding the types of analytics in a big data perspective with the realm in applicability towards healthcare data. Also, the processing paradigms and techniques can be clearly observed through the chapter contents.
Steganography has been considered as a major instrument used for an unauthorized and destructive purpose such as crime and warfare, and forensics has been used for a constructive purpose such as crime detection and fraud detection. Hence, the combination of both steganography and forensics plays a major role in the present internet era for information exchange between two parties. It has been propelled to the forefront of the current security techniques. The main objective of the technique is to provide an imperceptible way of transferring secret messages to the recipient. Another issue to be noted is that the term steganography completely differs from cryptography. The above-stated analysis is used in digital forensics. There are many steganography software tools available for ordinary computer users.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.