For researchers, it is crucial to examine the reliability and relevance of resources that are used in research work. Today, internet is the most consulted source of information. Even though it is used by many researchers, it can be the most unreliable source of information since there are no restrictions given to those who post information.
There are various ways that a researcher can turn to while trying to evaluate the sources. First, a researcher should always strive to use sources that have an author. The information contained in the sources may be true, but it is hard to validate information, whose author testimonials are not known. When the author is identified, the researcher may try to establish his or her educational background and employment details.
Secondly, a researcher should find out whether the information contained in the source matches with his or her research topic. This is done through examining the title, headings, table of contents, and other descriptions that have been given for the source. If the information, it contains, contradicts with the existing knowledge you should establish whether it can be verified. The nature of the publication is also identified whether it is a scholarly or a popular and also whether the research methodology is illustrated. At this point, the researcher should look into the sources, whether they have been cited inside the text or not. All reliable sources should contain in text citations. There are also details that show author biasness in the paper, this includes whether the author do away with some relevant information or write with feelings.
Thirdly, a researcher should examine the source of information. Information can be from a scholarly, accepted, academic or government agency. He or she should check affiliated institutions parent organizations and financing organizations. The URL also gives a clue of the person who created the source. For example, a URL ending with.edu shows a source from an educational institution. If it ends with.org, then it is most likely to be an organization and if it ends with.gov, it is most likely to be a government organization.
The fourth aspect that can be used in determining the reliability and relevance of a source is finding out the main reason why the source was created. Reflect on whether the main function of the source was to enlighten, convince, entertain or promote. The intended audience should also be established. At this point, a researcher should ask oneself whether the audience of the piece was scholars, public, professionals or learners. To be able to identify the source with ease it is essential to study the purpose statements for the journals. The date when the source was created also plays a significant part in determining the trustworthiness of the source.
Relevance and reliability plays a crucial role in determining the strength of ones research work. It is most likely that research work that contains relevant and valid ideas is accepted in the community, as opposed to one that lacks this information. It is essential that a researcher deals with various weakness that can hinder the ability of the research work attaining its intended purpose. The research work that passes all relevance and reliability procedures is strong, while one that fails to accomplish one or all the measures is weak.
In todays fast paced environment, Internet service has become an integral part of an organization. Access to internet is given to all the employees, some use it properly but some try to take advantage of this facility, leading to improper use of internet. Use of Internet by employees is allowed and encouraged where in it supports the goals and objectives of the company.
However, every company has written or unwritten policy for the use of internet and the employees must ensure that they (Sample Internet Policies and Notices, Para 3):
Comply with the policy.
Use internet in an acceptable way.
Do not create unnecessary risk to the company by the improper internet use.
Improper internet use comprises the following (Sample Internet Policies and Notices, Para 4):
Visiting sites that contain pornographic, obscene or illegal materials.
Sending offensive or harassing material to other internet users.
Hacking into restricted areas.
Unauthorised downloading of copyrighted material or software.
Uploading any kind of viruses or malicious software into the network.
Publishing false or defamatory material.
Borrowing other peoples words and ideas through internet (Plagiarsm and the Internet, n.d., Para 2).
Use of Internet
The internet is an electronic communication which is helpful in connecting computer networks and organizational computer facilities all over the world. The internet has brought important changes in the society. The development of technology has made easy access to unlimited information.
The personal information can be tracked and recorded through internet. (Rich & Smith, n.d., Para 1).Since the beginning of the internet era, there have been concerns that improper internet use would decrease productivity. Internet can be utilised to improve productivity. Some of the benefits are like no time or space limitations, easy and efficient way of finding information, data transfer, etc.
Improper use of Internet
Implementation of internet includes the organisations tactics of integrating the internet into its activities. Many companies are concentrating on the technical challenges and sometimes fail to notice the impact of internet on their business processes (Internet Implementation Tips, n.d., Para 1).
On the flip side, the productivity would decrease as the employee may spend a lot of time on surfing non work related sites. Now-a-days companies are dealing with an important issue that is the issue of privacy and ones right to privacy at work or on internet.
Companies are spending time and money to write policies for solving such issues for their own protection as well as their employees welfare. The companies require observing their employees to assure productivity and to check if they are not doing any illegal work, which could be harmful for companys reputation and progress (Rich & Smith, n.d.,Para 2).
The extent the companys can go to protect themselves makes it a debatable issue. Companies have started monitoring the employees not only in office but also during his breaks and outside the work, as a result interfering with their right of privacy. (Rich & Smith, n.d.,Para 1).
It is important to conduct business in a fitting mode, monitoring efficiency and, return while maintaining employee contentment. To keep a reliable service a company should keep a sense of comfort (Rich & Smith, n.d., Para 3).
As there is no fundamental law that states ones right of privacy it has become a controversial issue. There is a fine line between what is deemed acceptable and what can be revealed to public (Rich & Smith, n.d., Para 4 & 5).
Internet has been a major influence in shaping the companys mode of conducting business, leading to changes within the workplace and responsibilities of employees. Technology has made it easier for the company to check the employees productivity. The extensive use of internet has changed the security and supervision of daily business activity.
Electronic communications are getting intercepted and in many cases, employers are using it in their favour. Apart from being a necessity internet has also become a major distraction for the employees. Companies have increased electronic monitoring, to keep a check on personal emailing and illegal internet browsing (Rich & Smith, n.d.,Para 6 & 7).
Electronic monitoring has helped in providing feedback and implementing control. Employees can be monitored to get performance based feedback and improvement suggestions. Many companies are becoming dependant on internet, because of its ease and increased use, in their business activities.
This has led to the excessive electronic monitoring by the employer of the employee. Though it is vital for the security of the companys business but this has also led to the interfering in the employees right of privacy (Rich & Smith, n.d., Para 8 & 9).
In order to protect the right of privacy the companies are installing code of ethics, standard of practise for employees internet usage. This can also help in monitoring the staff performance and productivity and thus can be used as a benchmark for evolution. These codes should be followed by both the employees and the employers (Rich & Smith, n.d.,Para10).
Too much, intrusive control by the company can have negative impact on the employees personal life, resulting in negative productivity and demoralised behaviour. There should be trusting work culture where in everyone is respected. The employees should be made fully aware of the monitoring and the duties expected from them (Rich & Smith, n.d., Para11).
The company has full right to monitor the internet usage of its employees as internet can be used to access pornography, racist jokes, and sexually explicit material. Inadequate internet monitoring and its abuse can contribute to a hostile environment also (Rich & Smith, n.d., Para 12).
In the beginning, when internet started coming into the main frame of the business. It was fully access able and there was no monitoring or check. No one, neither the company nor the government was interested in putting surveillance on the usage of internet. Now with the use of internet by terrorists in doing their work has forced the government across the world to create policies about monitoring the use of internet (Rich & Smith, n.d., Para13).
The business environment has drastically changed with the advancement of Internet, where in, everything can be traced back to exact date and time of commencement. Still there is no specific law governing the monitoring of internet, privacy and human well being. Every company has its own rules and regulation.
The employees should be monitored to the extent that they are not unhappy to work as they will always be looking over their shoulders instead of concentrating on the work. Excessive monitoring will make the employee feel untrustworthy reducing their productivity and uninterested in the work environment (Rich & Smith, n.d., Para14).
The company should make sure that our privacy is not disturbed by the internet monitoring. The companys policies governing the Internet should be clearly informed to every user. It should be clearly mentioned what actions will be taken against the improper use of Internet.
This way the employee will also feel safe and trustworthy resulting in high productivity. We need internet monitoring with the regular threats of terror but not at the cost of our rights of privacy. Regular and unbiased policies should be made that safeguards the privacy of the user as well as it saves the business from any kind of loss due to its use (Rich & Smith, n.d., Para 15 & 16).
If the companies are having policies for internet use, which generally many companies do, one must get those hints. According to a survey, 35% of employers think that personal internet use should be restriced foe half an hour only (Mckay, n.d., Para 2).
Keeping aside companies policies, it is not at all suggesting that one must spend a lot of time using internet. One is being paid for his job but at the same time hecan argue that he is accessing internet for non related job or his personal use when he has finished his actual job. Then there will be a question why the people donot have this much ofjob which can fill their whole day (Mckay, n.d., Para 3).
Suggestions
People at work must surf wisely though their bosses care or donot care about what they are surfing (Mckay, n.d., Para 3). There are many sites which may be completely useless.They should stay away from such types of establishments. They should not think, that nobody as their bosses would not catch what sites they are visiting.
Some companies use such kindsof software which can record what sites their employees are visiting. Then there will be very embrassing situation when they are caught ((Mckay, n.d., Para 3). So they must avoid such kinds of situations and must adhere to use of proper use of internet that can increase their productivity at work.
Voice over Internet Protocol (VoIP) refers to the use of packet-switched internet protocol (IP) networks to relay a voice message. VoIP is among the latest modes of communication. As with a majority of the novel technologies, VoIP comes with both opportunities and security challenges. It has a unique architecture compared to the conventional circuit-based telephony. As a result, VoIP is susceptible to numerous security risks.
The benefits of a VoIP system to an enterprise include flexibility and low operation cost. There are different forms of Voice over Internet Protocol systems.
They include mobile units, conferencing units, and the ordinary telephone handsets. For a VoIP network to meet the needs of a user, it has to guarantee the quality of service. A VoIP system has little tolerance for interruptions. There is no single solution to security challenges that face data transmitted over VoIP. Thus, organizations should ensure that they acquire the appropriate network infrastructure.
Introduction
Voice over Internet Protocol refers to a collection of technologies and methods that facilitate the transfer of voice messages over IP networks. Other terms that are used to refer to VoIP networks include Internet telephony, IP telephony, and broadband phone service among others. VoIP systems can run on any form of computer. Additionally, the conventional telephone handsets can be modified to handle VoIP services.
Other equipment that can provide VoIP services includes mobile units, conferencing units, and softphone. Cheng and Lai (2010) argue, Quality of service (QoS) is fundamental to the operation of a VoIP network (p. 82). Thus, it is imperative to guarantee security measures when operating a Voice over Internet Protocol network.
Since the management of a VoIP system requires implementation of numerous safety procedures, it is hard to guarantee the quality of service. Among the challenges that affect a VoIP network include firewall delays, jitter, encryption-produced latency and blockage of call setups (Cheng & Lai, 2010). One of the benefits of VoIP over other communication networks is that it is cost-effective. The VoIP system compresses the electronic traffic of an organization into a single physical network.
Thus, it saves an institution from the cost of procuring a private branch exchange (PBX). To explore the challenges that affect VoIP networks, this paper will give an overview of the system. It will discuss the equipment, data handling, cost, speed, and security issues that affect a VoIP network. Additionally, the paper will discuss the quality of service issues..
Overview of VoIP
Many people who have the knowledge of data communication might have little background in transmitting voice or real-time imaging in a packet-switched environment (Cheng & Lai, 2010, p. 86).
VoIP technology is a novel concept to many people. Most people assume that it is possible to transmit voice messages over the normal network infrastructures without changing them. The reality is that installation a VoIP system results in numerous complications to the ordinary network. A majority of these challenges are made severe by security considerations.
VoIP Equipment
There are different types of Voice over Internet Protocol systems. Almost every computer can support VoIP services. Apple Macintosh iChat, Microsoft NetMeeting, and Linux platforms provide some VoIP services (Chong & Matthews, 2004). Voice over Internet Protocol is the infrastructure that helps to dial telephone numbers and communicate with people on the other end of a connection who have a VoIP system (Chong & Matthews, 2004, p. 109).
The increase in demand for VoIP services has led to the development of multiple products. The conventional telephone handsets are developed with additional features to support VoIP services. Some handsets are equipped with a small liquid-crystal display (screen), which helps to configure their advanced functionalities like call-park and conference calls.
Apart from modification of the conventional telephone handsets, VoIP technology has led to the invention of conferencing units. The groups offer services akin to those of the ordinary conference calling phone systems. The only difference is that conferencing units enable users to synchronize data communication services.
The invention of VoIP network has led to an adjustment of the average personal computer (PC) to create a softphone. A softphone is a collection of a headset, personal computer, software and a cheap connection service (Endler & Collier, 2006). The primary disadvantage of a softphone system is that it is prone to privacy and security issues. Personal computers that are connected to the internet get infested with viruses, worms and a multitude of malicious software.
Therefore, it is hard to guarantee the security of a voice message transmitted through a softphone system (Endler & Collier, 2006). Besides, personal computers are mostly connected to data networks. Hence, the use of softphone system makes it impractical to split data and voice networks. Voice over Internet Protocol system comprises numerous apparatus like routers, call processors, protocols, gateways, and firewalls.
Data handling
Endler and Collier (2006) assert, Before any voice can be sent, a call must be placed (p. 24). For a conventional phone system, call placement entails dialing the number of the intended recipient. The telephone companys system processes the dialed number and connects the caller to the consignee.
Voice over Internet Protocol system operates differently. Once the user dials a number, a composite sequence of packet exchanges ensues in line with a VoIP signaling protocol. The challenge is that while computer systems are distinguished by their Internet Protocol (IP) address, the user dials a regular telephone number to initiate a call. For the call to be completed, the phone number has to be connected to the IP address of the called party.
A set of rules is used to identify the IP address that matches with the recipients phone number. Once the recipient answers a call, the voice is changed into a digital signal and split into a series of packets. The entire process begins by changing analog voice pointers to digital. Because digitized voice demands a vast number of bits, a compression algorithm is used to reduce the volume of data to be transmitted (Endler & Collier, 2006, p. 31).
The compressed information is entered into data packets for secure transmission. The voice packets use the Real-time Transport Protocol (RTP). Each packet has a unique header field that contains the information used to reconstruct the packets to obtain the voice signal.
Cost
One reason many institutions opt to use the VoIP system is that it is cheap compared to other modes of communication. The VoIP system does not use the switched telephone networks. Consequently, it is cheap to transmit voice messages over long distances. The VoIP system does not send voice traffic over the ordinary telecommunication line configurations (Jiang & Henning, 2000). Instead, the traffic travels over private data network lines or the internet.
Voice over Internet Protocol is also cheap since it consolidates all of an institutions electronic traffic. An institution does not require procuring distinct private branch exchange tile lines for each type of traffic. Even though installing the VoIP system is expensive, a company enjoys noteworthy savings by managing a single network (Jiang & Henning, 2000).
An institution does not incur the cost of maintaining a telephony system. Moreover, the work of the system administrator becomes less tasking. The administrator manages a single instead of multiple networks. A company does not require hiring different workers to manage voice and data networks.
Speed and Quality
Theoretically, Voice over Internet Protocol can minimize the usage of bandwidth and enhance the quality of communication compared to the traditional public switched telephone network. Jiang and Henning (2000) posit, The use of high bandwidth media, combined with high quality of digitized voice, makes VoIP a flexible alternative for speech transmission (p. 84). However, the circumstances are quite intricate. System administrators encounter challenges in the effort to channel all the traffic of an organization through a single network.
The network becomes overcrowded leading to delays. The bandwidth usage depends on the digitization of voice by circuits, codecs or software procedures that encrypt and decrypt data for communication.
Therefore, minimizing the usage of the bandwidth may result in sluggish encryption and transmission processes (Jiang & Henning, 2000). Technologists are in the process of enhancing the quality and speed of transmitting voice messages through VoIP systems. Indeed, a majority of the organizations that uses VoIP systems do not detect momentous dilapidation in quality or speed.
Security Issues
The introduction of Voice over Internet Protocol system increases the demand for security measures within a company. A business requires guaranteeing the safety of both its data and voice. The federal government agencies have the duty to safeguard a lot of classified and unclassified data.
The agencies need to protect both the financial and sensitive information. On the other hand, public and private corporations require safeguarding their communications. Bradbury (2007) argues that in an ordinary office telephone system, security is a more valid assumption (p. 484).
One can hardly intercept communications. To block the communication, one needs to tamper with the private branch exchange of an institution or access the telephone line. Only institutions that transmit sensitive and classified information opt to encrypt voice traffic. The same does not happen for the Internet-related connections. Information sent via the internet is prone to interceptions. Thus, it is imperative to encrypt it to ensure that it is safe.
Bradbury (2007) alleges that the packets mailed via the internet go through systems that not under the control of both the sender and the recipient. If a hacker accesses one of the systems, they can install programs and screen packets for sensitive information. It underlines the reason people use encryption software to transmit data over the VoIP systems.
The existing internet structural design does not offer the security measures analogous to those of the traditional phone lines. The only way to secure the Voice over Internet Protocol system is to apply security techniques like the ones used to protect data networks. Currently, institutions use firewalls and encryption to secure the VoIP systems.
Quality of Service Issues
According to Bai and Ito (2006), quality of service is paramount to the functionality and effectiveness of a VoIP system. In spite of the installation cost, a VoIP system enhances communication within an organization. However, the discharge of varied security procedures affects the quality of service. For instance, the use of firewalls affects the speed of call setups. Moreover, it results in call delays, jitters, and encryption-produced latency.
Bai and Ito (2006) argue Quality of service issues is central to VoIP security (p. 801). If organizations were able to guarantee the quality of service, they would have been in a position to use the security measures used to safeguard data networks.
Nevertheless, it is hard to use most security measures used to secure data networks due to the time-critical state of the Voice over Internet Protocol networks. Also, VoIP systems do not tolerate packet loss and disruptions. The primary quality of service issues related to VoIP includes latency, packet loss, and jitter among others.
Latency
According to Kumar (2006), latency in Voice over Internet Protocol refers to the duration that it takes a voice data to travel from the sender to the receiver.
Preferably, institutions would like to use a network that has as low latency as possible. Nevertheless, there are realistic lower limits on the holdup of VoIP. For one-way traffic, the upper bound is 150 milliseconds (ms) (Kumar, 2006). The 150 ms limit corresponds to the present latency limit witnessed in local calls across the public switched telephone network lines in the United States.
The latency bound for international calls is 400 milliseconds. Calls made via the Voice over Internet Protocol network must satisfy the 150 ms limit to imitate the quality of service that the present phones offer. The time constraint experienced in VoIP systems leaves diminutive room for mistakes in packet delivery (Kumar, 2006). Further, it makes it difficult for institutions to implement many security techniques.
The process of data encryption and shipment across the United States may take up to 130 milliseconds. The time taken to transmit voice data across the North American continent may be less than 100 milliseconds. Security discharge and queuing take between 20 and 50 milliseconds.
Kumar (2006) maintains that delay does not only arise at the terminals of the system. Every leap along the system results in a fresh queuing delay and probably a processing latency for the case of a safety checkpoint. Also, transmission of big packets may lead to bandwidth jamming and increased latency. Therefore, Voice over Internet Protocol networks work well with small packages.
Jitter
Toral, Torres, Hernandez, and Estrada (2008) define jitter as the inconsistent packet delays. It results from limited bandwidth conditions in VoIP networks and may have severe effects on the overall quality of service. Toral et al. (2008) claim, Variations in delays can be more detrimental to the quality of service than the actual delays (p. 14).
Jitter may lead to erroneous reassembling of packets. Real-time Transport Protocol (RTP) depends on User Datagram Protocol (UDP). As a result, jumbled packets are not reconstructed at the protocol level. Nonetheless, RTP enables programs to reorganize the packets using the timestamp and sequence number fields. The cost of rearranging the packets is intractable when dealing with the stretched time limits of voice over Internet Protocol.
An increase in jitter results in the packets arriving at the terminal in bursts. Therefore, to manage jitter at the terminals, it is imperative to use a buffer. Toral et al. (2008) allege that for a buffer to be effective, it has to release the packets after every 150 milliseconds to minimize variations in delays.
Toral et al. (2008) maintain that the buffer implementation gets complicated when it is hard to tell if a missing packet is lost or delayed. If a latency is principally unreliable, the system cannot rely on historical delay times to determine the condition of a missing packet. Apart from the buffer, individuals can use firewalls and routers to manage jitter.
They can also use network elements that process data based on its urgency. Another way that an institution might mitigate jitter in its VoIP system is by enhancing the usage of the bandwidth. Nevertheless, it is hard to improve bandwidth usage without compromising the security of the data.
Packet Loss
Melvin and Murphy (2007) maintain that Voice over Internet Protocol is extremely intolerant of packet loss. Packet loss may arise as a result of excess latency. Some packets fail to reach the destination on time leading to them being cast off to accommodate the newer ones. Packet loss may also arise due to jitter. The primary reason VoIP is prone to packet loss is because it relies on the Real-time Transport Protocol.
A packet may reach the destination after its adjacent packets have been removed from the buffer, thus rendering it redundant (Melvin & Murphy, 2007). VoIP packets are normally minuscule and carry little information. Hence, it might be hard for a person to detect the missing words in case of packet loss. The only disadvantage is that packets are not lost separately. Bandwidth overcrowding and other sources of packet loss interfere with all the packages that are in transit.
The loss of a single packet might not affect the meaning of the intended message. Nevertheless, probabilistically the loss of one packet means the loss of several packets (Tadeus, 2004, p. 179). In other words, the loss of a single packet may result in the loss of numerous packets, thus degrading the quality of service.
Although it is hard to use an efficient delivery protocol like Transmission Control Protocol to enhance the quality of service, one can still minimize the challenge of packet loss. Tadeus (2004) argues that one cannot ensure that all the packets reach the intended destination. If one has an adequate bandwidth, they can send redundant information to cancel the prospect of loss. The problem is that it is hard to get such bandwidth.
The introduction of redundant information results in latency and, at times, aggravates packet loss. Steps are underway to develop novel codecs like internet Low Bit-rate Codec that tolerate packet loss. The codecs will guarantee that the meaning of a message does not change despite the loss of some packets.
Conclusion
The development of Voice over Internet Protocol network is a complex process that must be handled with great care. The network managers can hardly detect the numerous challenges that affect data packets. The incorporation of a VoIP system into an already overworked network may be detrimental to an organization. There is no approved solution to the challenges, which affect voice data that is in transit via a VoIP network.
Organizations must use different solutions selectively according to the nature of VoIP system that they use. Institutions can run secure VoIP systems; however, they have to incur a high cost with respect to installing security measures. Until the experts come up with a reliable and efficient method of running a VoIP network, organizations should operate their systems cautiously. They should ensure that they acquire the correct software and establish the appropriate network infrastructure.
References
Bai, Y., & Ito, M. (2006). A study for providing better quality of service to VoIP users. Advanced Information Networking and Applications, 1(2), 799-804.
Bradbury, D. (2007). The security challenges inherent in VoIP. Computers & Security, 26(7), 485-487.
Cheng, F., & Lai, W. (2010). An overview of VoIP and P2P copyright and lawful-interception issues in the United States and Taiwan. Digital Investigation, 7(2), 81-89.
Chong, H., & Matthews, H. (2004). Comparative analysis of traditional telephone and voice-over-internet protocol (VoIP) systems. Electronics and the Environment, 3(1), 106-111.
Endler, D., & Collier, M. (2006). Hacking exposed VoIP: Voice over IP security secrets & solutions, New York: McGraw-Hill.
Jiang, W., & Henning, S. (2000). Analysis of on-off patterns in VoIP and their effect on voice traffic aggregation. Computer Communications and Networks, 4(1), 82-87.
Kumar, A. (2006). An overview of voice over internet protocol (VoIP). Rivier College Online Academic Journal, 2(1), 1-13.
Melvin, H., & Murphy, L. (2007). Time synchronization for VoIP quality of service. Internet Computing, 6(3), 57-63.
Tadeus, U. (2004). Quality of service in VoIP communication. International Journal of Electronics and Communications, 58(3), 178-182.
Toral, H., Torres, D., Hernandez, C., & Estrada, L. (2008). Self-similarity, packet loss, jitter, and packet size: Empirical relationships for VoIP. Electronics, Communications and Computer, 5(3), 11-16.
Regardless of traffic and direction, Internet resources must comply with the accessibility principles established by WCAG 2.1 guidelines. However, it is of great interest to attempt to correlate these principles with alternative forms of data provision: banners,.pdf,.pptx, or.docx files. It is essential to assess how widespread off-websites availability is, which is the purpose of this work.
Billboard
For advertising products hung on the streets, the convenience of perception of information is critical. For this reason, designers often use vibrant colours that can attract attention. However, as WCAG 2.1 postulates1, these colours need to be matched in contrast. If to address poster Samsung2, Figure 1, it is possible to find out two base colours: blue background and white text. The contrast ratio calculator3 determines that between two colours, the ratio is 2.04:1, which is absolutely inadmissible under conditions 1.4.6, Level AAA. In order to make it easier to view ads for people with visual impairment, designers should change the background colour, for example, to RGB (4:91:128).
Poster
Meanwhile, WCAG 2.1 gives other relative picture recommendations: for example, 1.1.1, Level A. As it can be seen in Figure 24, there is a mans face and a small signature at the bottom of the poster. Although this form is impressive and makes us feel certain emotions, for people with impaired vision or cognitive impairment, it is necessary to introduce a text alternative. For instance, designers could add text elements to the poster from below, as shown in Figure 3.
PDF
Fiction and science literature often uses column format when the text is presented in two parallel lines on the page. This is always difficult because there is no single standard regarding the reading sequence. Figure 45 illustrates this misunderstanding: the user may be wrong in which order to read the information after the word In. This is not following the principle stated in 1.3.2, Level A. However, one can either add read more on this page or change the sequence of text to a single column to address this shortcoming.
DOCX
Most often, if a website offers access to a.docx text file, the document is usually downloaded to the users computer. Moreover, while such documents can often be customized to fit one own needs, the manufacturer must take care of readability. Figure 56 shows that the downloaded.docx cannot be changed because this action is locked. 1.4.8, Level AAA, indicates that a 1.5 line spacing is required, but the document only provides a single one. Fixing this situation does not seem difficult: it is enough for the manufacturer to change the interval.
Labels
In stores designers need to use WCAG 2.1 guidelines, as all customers have different levels of health opportunities. Cases, where the manufacturer is responsible for placing the customer in a discriminatory position, should be excluded, as can be interpreted in Figure 67. Although IKEA is known for its unique product naming, according to 3.1.3 and 3.1.6, Levels AAA, the mechanisms of reading should be presented for compound words. For instance, for a word shown in Figure 6, designers could add a transcription, as shown in Figure 7.
References
Jason in Hollywood, Unbox Your Phone Samsung Galaxy S8 Billboards [Website], Web.
In the future, things are expected to become active participants in business, information, and social processes, where they can interact and communicate with each other, sharing information about the environment, reacting, and influencing the processes taking place in the world without human intervention. The Internet of Things (IoT) is inherently a continuous flow of data in space, passing through various networks. The purpose of this work is to prepare the summary of the article devoted to discussing the phenomenon of the IoT.
The article by Kenneth Li-Minn and Kah Phooi Seng
The multi-page work by Kenneth Li-Minn and Kah Phooi Seng includes three sections that are differently suited to the question of determining the IoT. Authors introduce the reader to reasonably everyday examples that allow a closer understanding of the concept of the objects described (2). In order not to get lost in the variety of different forms, Kenneth Li-Minn and Kah Phooi Seng divide all known mixture of IoT into eight categories. Kenneth Li-Minn and Kah Phoois draw show other categories, which include medical, scientific, agricultural, and environmental examples (1). The main idea of this section is to demonstrate that the needs of society dictate the creation of electronic devices.
Data storage and security issues
Since IoT is based on methods that meet user needs, much attention must be paid to data storage and security issues. The authors are convinced that this issue should be taken into account when creating a complex system architecture. The models of organization offered by researchers are multilayered, where each level is designed for a specific task (6). Not least in the functionality of such things is the recognition of biometric indicators. Of course, creating sensors for such a mission is both labor- and resource-intensive, which is why authors argue that building IoT should be based on the integration of energy efficiency, multifunctionality, and compactness.
Areas for the evolution of IoT
The last section is devoted to forecasting the future of such devices. The researchers identify four areas that are likely to be the route for the evolution of IoT, and the first is the ecosystem integration between devices. Second, future work will focus on improving energy efficiency and performance. Third, given the trends in machine learning today, future devices will operate on the principles of neural networks and artificial intelligence, anticipating user demands. Finally, more data will be collected, and the more complex the protection protocol must be. Researchers are convincing their readers that the IoT of the future should be inaccessible to hacker attacks regardless of the application.
Work Cited
Ang, Kenneth Li-Minn, and Jasmine Kah Phooi Seng. Application Specific Internet of Things (ASIoTs): Taxonomy, Applications, Use Case and Future Directions. IEEE Access, vol. 7, no. 1, 2019, pp. 56577-56590.
Due to manifold effects of technological innovations, education has undergone significant and positive changes connected with the simplification and automation of sophisticated processes, the introduction of audio-visual media, and the advent of the World Wide Web, one of the powerful instruments for acquiring knowledge.
Supporting arguments
The introduction of computerized devices has made it easier for instructors to convey information and present material. In particular, most processes have been greatly simplified due to the introduction of automated elements to education. Lawless and Pelegrino (2007) insist on the fact that the introduction of technology to the educational process will considerably promote students achievements and will increase teachers awareness of technology professional development. In particular effective practice in teaching and learning is closely connected with the process of technology adoption. Hence, the authors argue the necessity to provide consistent plans for software and hardware implementation (Thomson, 1999, p. 30).
Technological advances can also offer audio-visual media being a powerful interactive tool. PowerPoint presentations, animated software, screens, and overhead projectors allow students to grasp large pieces of information. These audio-visual devices contribute to students greater interest in learning and significant improvement in students attention and attendance. In particular, using audio- and video- material considerably contributes to the quality of a learning process.
By practicing visual and aural memory are much more active when being involved in software presentations (Bates, 2005, p. 176). Therefore, shifting from pencil and paper devices to the more advanced ones allows students to manage knowledge more successfully.
It has now recognized that the World Wide Web is a powerful tool for acquiring knowledge. Containing hundreds of online catalogs, databases, and libraries, the Internet provides students with all necessary information. About this, the introduction of online techniques of information search infuses the necessity of implementing new strategies of knowledge acquisition (Hamada and Scott, 2000, n. p.).
The technological integration does not only involve the usage of new software devices but also requires the knowledge of specific terms related to technology and education. For example, the authors can draw certain insights from the recent experiences of intranet technology applications (Hamada and Scott, 2000, n. p.). Also, a new dimension of knowledge acquisition influences social and political processes (Sullivan, 2002, n. p.).
Online education, or distant learning, is a new word in higher learning. Nowadays, many educational establishments are offering online programs and courses for students who cannot study on a full-time basis (Bates, 2005, p. 18).
Many students have a chance to obtain an online degree of any academic level and in any discipline. Online learning, therefore, considerably facilitates communication and interaction. It also enables to establish cross-cultural interaction between students from different countries (Bates, 2005, p. 172). Though there are many adversities students face while overcoming cultural barriers, they can still learn new facts about other cultures and traditions.
Annotated Bibliography
Bates, T. (2005). Technology, e-learning, and distance education. NY: Routledge.
The books can serve as an effective guide to technology use in distance learning. The author states that technology is neither good nor bad for teaching, but still it is present in educational sphere. In order to handle it effectively, it is necessary to learn the basics of design and delivery of teaching techniques with the help of technology.
Hamada, T., and Scott, K. (2000). Anthropology and International Education via the Internet: A Collaborative Learning Model. Journal of Electronic Publishing. 6 (1). Web.
The article provides the role of the Internet in knowledge acquisition and creating new techniques for information search. With the invention of specific Web models of knowledge acquisition, both students and teachers have to work out new strategies for handling the academic process. The article also provides the essentials of knowledge acquisition and the influence of social changes to this process.
Lawless, K. and Pellegrino, J. W. (2007). Professional Development in Integrating into Teaching and Learning: Knowns, Unknowns, and Ways to Pursue Better Questions and Answers. Review of Educational Research. 77(4), pp. 575-614.
In the article, the author discusses the phenomenon of technology integration into teaching and learning as well as to what extent this process increases the effectiveness of educational achievements. In addition, the article provides an evaluation plan presenting the pertinent information needed for better comprehension of important educational problems within technological content.
Sullivan, M. F. (2002). Of Victories and Ventures Editorial. Technos: Quaterly for Education and Technology.
The editorial article describes a political view on integrating technologies in education. In particular, it considers the necessity to use technological innovations for equipping schools. According to the author, the introduction of software and hardware is a necessary financial contribution to the educational sphere.
Thomson, H. (1999). The Impact of Technology and Distance Education: A Classical Learning. Educational Technology & Society 2(3) pp. 29-40.
According to the author, there is a close connection between education and social formations. In other words, the article emphasizes the role of social norms and values in determining the nature and character of education. Technology is one of those values. In addition, the author also believes that the educational and knowledge are under great influence of technologies that transforms theses spheres according to the existing technological mechanisms.
Summary of an Editorial Article
Summary of the Article
The article under consideration is called We Are the Press. You Know our Power and is written by Sullivan (2002). In his work, the editor expresses the idea that the Internet has fully captured the information sphere and has made the book production much easier that, in its turn, has decreased the role of the book production and financing. Referring to historical information about the origins of books production, Sullivan (2002) focuses that book manufacturing used to be under the influence of art. However, contemporary attitude to making books has nothing in common with aesthetics.
Critique of the Article
According to the author, the advent of the Internet has decreased the importance of book making due to the existence of electronic books. On the one hand, such situation prevents from considering books as items of art contributing the aesthetic value of those. On the other hand, the primary purpose of books is to provide information and experience to readers who want to get the information they need. In this respect, the author places an emphasis on the artistic value on books rather than on their informative value.
Though the aesthetic value of books was lost to some extent, the increasing availability of online book technologies positively contributes to improving the educational databases that have now expanded their online resources for readers all over the world (Cavanaugh, 2005, p. 2). An e-book, hence, is an effective educating tool for meeting students specific needs. What is more important, the introduction of new software devices is a new world in presenting descriptions and illustrations of the most popular book programs and platforms.
According to Cavanaugh (2005), if reading may always be a constant in education, what may change is the way that we teach reading and the tools that we use (p. 3). In other words, though electronic book requires the knowledge of specific reading techniques, the utilization of digital information is the step forward toward the technological and education advancement. Comparing this statement to the assumptions presented in the article, it should be noted that Sullivan is more concerned with the way the source is presented but not with what it actually presents.
Despite the discrepancies concerning the reasonableness of using electronic sources, there is still a problem with the protection of intellectual property, which is much more serious in the Web space. From this perspective, the usage of hardcover books is much more save and legal (Sullivan, 2002). Nevertheless, the problems exist in both spheres. The rise of the Internet has created much more space for developing a copyright system protecting the authenticity of electronic sources. What is more important is that students can use official and education sites that are protected enough from plagiarism.
In general, considering the Internet as powerful tool for educating and for acquiring knowledge, the form of information presentation becomes of secondary importance whereas the aesthetic value should be redirected at other than education spheres. The primary purpose of learning and teaching is increasing students performance and improving their results.
Reference List
Bates, T. (2005). Technology, e-learning and distance education. NY: Routledge.
Cavanaugh, T. W. (2005). The digital reader: using e-books in K-12 education. US: ISTE.
Hamada, T., and Scott, K. (2000). Anthropology and International Education via the Internet: A Collaborative Learning Model. Journal of Electronic Publishing. 6 (1). Web.
Lawless, K. and Pellegrino, J. W. (2007). Professional Development in Integrating into Teaching and Learning: Knowns, Unknowns, and Ways to Pursue Better Questions and Answers. Review of Educational Research. 77(4), pp. 575-614.
Sullivan, M. F. (2002). Of Victories and Ventures Editorial. Technos: Quaterly for Education and Technology.
Sullivan, M. F. (2002). We Are the Press. You Know our Power Technos: Quaterly for Education and Technology.
Thomson, H. (1999). The Impact of Technology and Distance Education: A Classical Learning. Educational Technology & Society 2(3) pp. 29-40.
The age of the Internet is affecting traditional print reading, but not for the reasons one might think. It is evident that teenagers and children, who use the web more actively, both read and write a considerable amount. The main explanation is that the given activities are one of the few ways a person can interact with the internet, others being video and voice exchange. However, the format of reading and writing on the web is vastly different from the traditional print versions because online texts come in a shorter form. Therefore, the declining scores of students in regards to reading are the result of a change incapability to focus and concentrate because these mental muscles are being atrophied.
Ones ability to focus on a single task is highly dependent on the type of activity. It is stated that many writers face troubles when they are unable to concentrate on a book without getting distracted after two or three pages (Rich, 2008). In other words, active internet use negatively affects people by robbing them of their ability to focus on a single activity. However, one can present a counterargument to the given statement by claiming that it is not reading that is negatively affected by the web, but rather the style or format of the activity (Carr, 2008). It means that the internet encourages or facilitates the use of shorter texts due to their efficiency, which might also mean that such an approach is more superior to the traditional long pieces.
The age of the net eliminated the need to memorize the majority of items due to their constant availability online. One should understand that human memory is an instrument that is far from perfect because it can operate in a faulty manner (Introduction to psychology, 2015). Therefore, a persons cognition, which is the process of acquiring and using knowledge, is more relevant today (Introduction to psychology, 2015).). In other words, it can be argued that the Internet made peoples lives easier by removing the need for memorization and focus.
Although one can view it as a negative aspect of the web, similar arguments can be made against any modern technology, such as phones, cars, or escalators. For example, cars and elevators reduce the need for physical activity, which is why one might condemn them for being responsible for inactivity-related issues. However, any manifestation of progress leads to the elimination of some challenging aspects of life. A person can compensate for the reduction in activity by going to the gym or exercising at home. Similarly, the internets format for reading and writing might be considered as something negative, but the fact is that it is efficient at delivering the information. In addition, it eliminates the need to memorize and focus for prolonged periods, which is why one might experience a drop in concentration.
In conclusion, the age of the internet might be the main cause of the reduction in reading scores among students, but the problem lies in the fact that the testing methods are outdated. The current format of texts is more concise, whereas traditional prints are long. The measurement approaches need to change without condemning the evident benefits of progress, where a person does not need to concentrate and memorize to learn and think. Therefore, online reading is a mere shift from the regular type of activity.
References
Carr, N. (2008). Is Google making us stupid? The Atlantic. Web.
Introduction to psychology. (2015). Minneapolis, MN: Libraries Publishing.
Rich, M. (2008). Literacy debate: Online, r u really reading? The New York Times. Web.
China has emerged as the technological giants in the current era and China is giving a tough time to major countries of the world by effectively adopting and implementing a low-cost strategy. The policies of the Chinese government are stiff and it is believed that their strategies possess double standards. The government of China is massively criticized on a number of issues like human abuse in Tibet and Darfur. The government of China banned certain websites although the journalists were promised to carry their work (Brennan, 2008).
The internet is experiencing a boom and the entire economy of a country can be transformed through the internet. The Chinese government is posing problems in terms of privacy and secrecy for the people of China in terms of internet access (Beehner, 2008). The economy of China is in its transformational era and the economy has transformed from a planned economy to a market economy. However, the Chinese government is applying barriers for businesses, as their policies are getting stricter day by day. They are ignorant about the fact that through the internet China can fulfill its strategies and they can easily achieve its objectives (Chau, 2008).
The freedom of speech a number of times was questioned in China and a writer was sent to jail when he wrote an article about the Chinese government (Edidin, 2008). People is China are restricted to know what is happening within the government and they are restricted to raise their voices (Kahn, 2005). The government is restricting the internet because they believe that sensitive information would flow out of this region to other regions of the world. However, people are finding ways to remove these barriers (Pan, 2005). The internat affects the economy and governmnet has to remove these bariers in order to progess in this era.
The powerhouse of technology China has won the race of the most cell phone users in the world. The county is rich in technology and has more engineering students and technological companies than USA. The technological giants are ready to face the challenges of the current er and they have the tendency to pass every coutry in terms of technology. The previous center of technology Silicon Valley which was located in California is shifting towards China (Fannin, 2008). The technological change has transformed the educational system in China and the implications of technology are quite visible in the infrastructure.
Global organizations face difficulties in China because of different entry barriers and strict rules and regulations applied by the Chinese government. However, the Chinese government is focusing on the local markets and they are providing a stepping stone to the local vendors in order to experience staggering growth (Popkin & Iyengar, 2007). The impact of technology is tremendous in China and the internet plays its role in the development of China.
Thus, in a nutshell we can say that China is progressing and emerging in the world as a super power. The form of government in China is of communist nature and people are considered to be aethiset in China. Goverrment provide facilities to the people and they want want to excel in the race of technology and militiary upgradation. But, the government of China is becoming a hinderance in the progress individuals because they are putting they undue barriers on the use of internet.
The internet is probably one of the most outstanding technological innovations throughout the history of humanity because it affects virtually all aspects of life. The internet has been used to revolutionize how the world operates, especially with the automation of traditional social, political and legal systems. For instance, the processing of tickets, payment transactions, purchases, conferencing, shopping, and similar activities today, are all done online. The evolution of the social networking site is strong evidence of how the internet has taken the world by storm, with major social sites such as Facebook, posting a record of 500 million users across the globe (Facebook, 2011). The numbers rise by the day.
The internet is the tool that has transformed the world into a global village, through numerous information and application systems, ranging from global news, knowledge wealth, communication access, and other platforms. However, with the invention of the internet, many people have come out strongly to detest its use, citing several disadvantages brought about by its applicability. This is the reason why there has been restricted use of the internet in some areas such as the Middle East where the internet has been termed a danger to social cohesion (Ham, 2009, p. 461).
However, in the Western world, the internet has been openly embraced in education, politics, commerce, and other functional areas of life, but theyre still are some critics existing in the Western world who advocate for a ban of internet usage. The internet has therefore come with its fair share of controversies and appraisals and in this light, this research paper seeks to explore its advantages and disadvantages, with a special touch on political, ethical, and legal impacts of the internet on society.
Advantages
On the social front, the internet has been able to improve the quality of entertainment especially because it currently provides users with several multifaceted types of entertainment (Buzzle, 2010, p. 2). For instance, many users can download games, surf the web, and do other activities that were normally not possible with traditional sources of entertainment such as the television and the radio. For adults, the internet, through the chat feature, has enabled users to meet new people and date, for virtually no fee. This feature has especially been commended because it breaks the barrier of meeting new people in the real social setting (Buzzle, 2010, p. 2).
On the political front, the internet has been quite useful for many users because many now have access to information regarding anything under the sun. Such information can be easily sourced from search engines such as Yahoo and Google. Most importantly, users can obtain information regarding existing laws, government activities, government services, political manifestoes, political systems, trade fairs, and virtually any political issue in the globe (Buzzle, 2010, p. 3).
On an ethical front, the internet does not discriminate against people in terms of service delivery and information access because most of its services are free and applicable to all. This is a great advantage, especially when compared to the real-world setting where most services are handled by people who are often prejudiced on racial, religious, class, and gender lines. The internet has therefore provided an opportunity for all types of people to get products and services in a free manner.
Moreover, the fact that most services on the internet are free is a huge plus in its usability because, in the real world, not many services (like communication services) are free. For example, sending an email is free but sending a letter through the post office is not. The internet, therefore, eliminates any possibilities of unscrupulous businessmen financially exploiting people.
Disadvantages
On an ethical front, the internet has increasingly created an unmanned channel through which the theft of personal information thrives (Buzzle, 2010, p. 7). For instance, many users have increasingly experienced instances where their names, addresses, credit card information, and other personal information have been used without their consent. Also, one of the most common challenges attributed to internet use is access to pornographic or other morally inappropriate content. This problem has been cited as most dangerous to childrens wellbeing because it may affect their mental development (Buzzle, 2010, p. 3).
Also, on an ethical front, the internet has increasingly exposed users to viruses, malware, and spyware attacks. These kinds of attacks have often resulted in an attack on users computer systems. In severe cases, these attacks have resulted in several financial and emotional implications, in the sense that, computers crash and users increasingly get frustrated by the negative impact of viruses on the operational speed of their computers.
These sorts of attacks have also been used by some people to get information from a users computer without their consent. Sometimes, these attacks result in increased instances where information stored is eventually destroyed. Most, unfortunately, virus and malware attacks are not preventable, no matter how much a user tries to avoid them (through antivirus programs and the likes) (Buzzle, 2010, p. 7).
From a legal perspective, the internet has created a lot of legal problems because through its use, there has been an increased need to formulate new policies and laws to govern its use. Such has been the trend noted with cybercrime (Bidgoli, 2004, p. 264). The protection of intellectual property through legal means has also been complicated by increased use of the internet because there have been increased instances of plagiarism and other professional crimes which have been greatly facilitated by internet use (Bidgoli, 2004, p. 264). This sort of problem has created an increased need to formulate laws that protect intellectual property.
Conclusion
Technology has revolutionized the way the world operates today. This study points out that the internet has several positive and negative aspects to its use, but from a personal point of view, the disadvantages of the internet outweigh its advantages. This fact is only true when analyzed from an ethical and moral point of view (Ham, 2009, p. 461). The disadvantages of the internet outweigh its advantages because the internet has practically broken most ethical and social structures that control the functioning of the moral and ethical systems of different communities (Ham, 2009, p. 461). In other words, most of the things that were previously considered discrete are not.
Restrictions that were also applied by parents in the family setting (for example) have been broken down by the internet, and this is why there are increased concerns of children watching inappropriate content on the internet (Ham, 2009, p. 461). This increased sense of freedom and liberty that the internet brings, cannot in any way support an upheaval of moral principles in society. This is true because high moral standards and ethical standards can only be realized through restraint (Ham, 2009, p. 461). The internet does not support this.
References
Bidgoli, H. (2004). The Internet encyclopedia, Volume 1. London: John Wiley and Sons.
Buzzle. (2010). Advantages and Disadvantages of the Internet. Web.
Facebook. (2011). Statistics. Web.
Ham, A. (2009). Middle East. New York: Lonely Planet.
Telnet and FTP (File Transfer Protocol) are two protocols that use TCP as a transport to initiate sessions on remote computers and both programs fall into the server-client model. Both protocols lack encryption, and process passwords and logins over the internet in the form of plain text. (Farrell)
The principles of works of the protocols are similar, where the client machine sends the orders while the server receives them. The main difference is the usage of protocols, where FTP as its abbreviation implies establishes the connection to send files over then networks, while Telnet is used to work on remote terminals configured as servers by running commands from remote machines configured as clients.
Ethereal
Ethereal, the current name is Wireshark, is a program that analyzes packets and network traffic. The program allows looking through all the transient traffic that goes the network adapter in real time, capturing, decoding, and analyzing each packet. Although the program might have gained a popularity trough illegally intercepting valuable information, the program can be used as a diagnostic tool and also in education purposes. For example, Ethereal can be used when analyzing network clients and their behavior with different applications and drivers. Other examples include allocating problems of connectivity loss, graphing traffic patterns, and building statistics. (Combs)
Network Sniffer
Sniffers are programs that analyze traffic. In order to demonstrate the work of a sniffer to identify streams, the example of the program Ethereal will be used. Ethereal recognizes the structure of each protocol, and thus allows disassembling the network packet, showing every protocol field at any level, e.g. in Ethereal, there were currently 759 protocols that could be dissected. (Ethereal: Features) Thus, during browsing or any other internet activity, during which a login and a password were entered, the sniffer will capture all the packets that were sent and received during that session. The sniffer can translate each package according to the protocol used, e.g. HTTP and the stream that carried the login and the password can be revealed.
PBX
The simulation of PBX can be implemented through specific emulating software which emulates the hardware parts of the telephone exchange with software analogues. In this case the work of the PBX will be completely emulated on the computer, with no physical connections present. Additionally, other equipment, such as routers, can be configured to simulate the work of PBX and PSTN. In that regard, the simulation will involve physical connection with only the router simulating a PBX.
VOIP
There are many protocols available for Voice over Internet Protocol (VoIP), the most common of which are the following (Packetizer; Ixia):
The Protocol
Advantage
Disadvantage
H.323
better interoperability with the PSTN
better support for video
excellent interoperability with legacy video systems
no built-in methods for reporting user location
far more complex
SIP
easier to develop and troubleshoot
high compatibility
inability to detect a traveling device
MGCP
cheap local access system
carrier class MGCP/Megaco media servers available today and deployed in the field