The main aim of this action research is to improve the student's technical problem-solving skill to fix and manage different technical problems in higher education Institutes. One of the main reasons for the deterioration of higher education institutions in providing the labour market with qualified professional cadres is keeping academic curricula in the classical frameworks and not develop the curricula to coincide with the technical progress. Solving technical problems has become an urgent need of the majority of the commercial companies, due to the expanded use of computer technologies and networks, for example, a single technical problem that disrupted the work for an hour may cost the businesses hundreds of millions of pounds. The implementation of this action research done in two different stages, the first and second stage to implement during the study and the third stage will perform in the future. The first stage strategy to achieve the Social Cognitive Theory (SCT), The second stage to implement the Problem Based Learning (PBL) using Guided practice strategies. Simple questioners were given to the learners, before and after the formative or summative assignments or the class problems solving activities. The results of questionnaires were analyzed in detail to determine the actual impact of different strategies applied to enhance problem-solving skills. In this research, we have been able to reach satisfactory results to improve the level of students in technical problem-solving skills this required significant efforts and times using PBL, Guided practice tutorials to help the learners mastering the problemsolving techniques. Because of the time limitation of this action research, the third stage of using PBL with application strategy to reduce the amount of the efforts and times will be implemented in future research.
The goal of this work is to advance a new methodology to measure a severity cost for each host using the Common Vulnerability Scoring System (CVSS) based on base, temporal and environmental metrics by combining related sub-scores to produce a unique severity cost by modeling the problem"s parameters in to a mathematical framework. We build our own CVSS Calculator using our equations to simplify the calculations of the vulnerabilities scores and to benchmark with other models. We design and develop a new approach to represent the cost assigned to each host by dividing the scores of the vulnerabilities to two main levels of privileges, user and root, and we classify these levels into operational levels to identify and calculate the severity cost of multi steps vulnerabilities. Finally we implement our framework on a simple network, using Nessus scanner as tool to discover known vulnerabilities and to implement the results to build and represent our cost centric attack graph.
Cyberstalking is generally considered to be harassment that originates online; however it is also recognised that other forms of pre-existing stalking can transfer into online environments. Cellular phones are now owned by the vast majority of adults (91% in 2010/2011) in the United Kingdom. It is believed that this number will approach, and probably reach, 95% within the near future.The World Wide Web and Internet are great places to study, work or even play, but there is an unpleasant side to cyberspace. Cyberspace reflects the real world and some people tend not to remember that. Cyberstalking and harassment affect a large number of people (especially women). It should not be assumed that just because an individual owns the technology and has an Internet account that person is ethical. There are just as many stalkers in cyberspace as anywhere else; it is just that their methods have changed. In some cases, this harassment may become an organised operation, where stalkers attack with intimidating messages of hate and indecencies. In this paper we study the different aspects of the technologies used in stalking and some methodologies to reduce the impact in relation to our own safety and security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.