نتایج جستجو برای: byod
تعداد نتایج: 233 فیلتر نتایج به سال:
This paper proposes an ICT based system for enhancing teaching and learning in a large classroom and increasing the interactivity to improve learning. Typically, such a classroom suffers from difficulties in audibility of lectures, seamless teacher-student interaction, monitoring attention of students, collecting attendance and conducting examinations. BYOD (Bring Your Own Device)1 paradigm has...
The emergence of the COVID-19 pandemic in early 2020 has transformed how individuals work and learn they can apply cyber-security requirements their, mostly remote, environments. This transformation also affected university student population; some needed to adjust new remote settings, all study environment. In this online research study, we surveyed a large number students (n = 798) understand...
Historically, Telecom Networks were a Mixture of TDM/Circuit Switched and Packet/Datagram based and used techniques such as TDMoIP and IPoTDM for internetwork communication. Voice and Data Networks were separate. NGN was envisioned as a pathway towards a converged ALL-IP network capable to cater to Voice, Video and Data services. Around 2005, newer services such as SAN’s, NAS’s, CDN’s, WSNs, Lo...
An analysis of 6 million accounts showed that 10,000 common passwords would have access to 99.8% of the accounts. When looking at passwords for banking accounts, it can be found that 73% of users shared their online banking password with at least one non-financial site, which means that when the non-banking site gets hacked, the banking account is threatened. And it’s not only about security. A...
Combining mobile technologies with Augmented Reality (AR) has recently enabled the ubiquity of AR technologies in our everyday life. Many schools are implementing 1:1 iPad or Bring Your Own Device (BYOD) programs and in this way smartphones and tablets are being increasingly used by students to improve learning. There are many augmented reality (AR) applications available that can be used to cr...
Abstract BACKGROUND As regulators put more attention on patient-reported outcomes (PROs) in oncology clinical trials, it is vital to understand patient preferences and motivation for completing PROs. We investigated motivations symptom reporting how this may differ between participants with cancer other chronic non-oncology diseases. METHODS Participants completed an online survey focusing usin...
Social engineering has emerged as a serious threat in virtual communities and is an effective means to attack information systems. The services used by today’s knowledge workers prepare the ground for sophisticated social engineering attacks. The growing trend towards BYOD (bring your own device) policies and the use of online communication and collaboration tools in private and business enviro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید