Friday, July 23, 2021

ENIGMA OF E-LEARNING

 





Purpose: The following main objective will guide this book to explore the enigma of E-Learning 

Problem

The impact of using ICT in teaching physical Science also harms schools. However, attaining the expected benefits has not always materialised due to inadequate policy frameworks, implementation plans, and ineffective communication of these benefits to intended users, resulting in conflicts between users, managers, and implementers. Elimination of geographical obstacles for e-students to be able to access resources from any location is essential merit. There is a deluge of cyberattacks metered on the e-learning and teaching which are viruses, eavesdropping, Denial of   Service Attack, Ransom ware  and others

Methodology

Finally, the explanatory design was adopted to elucidate the correlation between variables. This tactic is appropriate to elucidate and interpret correlations. More specifically, the study adopts a QUANTITATIVE + qualitative notation, where the qualitative component is a less dominant approach than the quantitative component. The Saunders Research Onion was applied in unravelling the Enigma in E-Learning.

Key Finding

The Pearson correlation results demonstrate a positive relationship between the positive impact of using  ICT in teaching and learning Physical Science and student performance. The variable used to deconstruct the constructs was improved teaching and learning increased performance, and increased pass rate. The variable for improves student performance is 0.88, and that one for increased pass rate 0.66. It can be concluded that there is a robust correlation between the positive impact of teaching and learning Physical Science and increase in student performance; this also increases pass rate. The researcher, therefore, accepts Ho; There is a significant positive relationship between the positive impact of using ICT in teaching and learning Physical Science and student performance and rejection. Ha: There is no significant positive relationship between using ICT in teaching and learning Physical Science and student performance

Key Recommendation

As a risk reduction approach, it is recommended that patching, education and training, biometric security, uncrack able passwords, patch management, encryptions, digital signatures, firewalls, new cybersecurity tactics, updated anti-viruses from reliable vendors should be executed in the organization.  The state within the office of the presidency should adopt some cybersecurity measures and policies meant for human capital development and training these including the creation of the secure cyber ecosystem utilizing a national nodal agency, corporate encouragement for appointing a senior member as a Chief Cybersecurity Officer for  crafting the updated cyber- security policies 


Research question ;Which of the following e-learning Enigma  are you encountering during the teaching?

COMPUTER VIRUSES

 

When participants were asked which of the following ICT challenges are encountering during the teaching and learning process, six per cent Strongly disagree that viruses are a challenge, twenty-three per cent were neutral, thirty-one per cent disagree, and the remaining thirty-eight per cent strongly agree. The findings of this research are analogous to the works of Falco (2018). Although the lexis “viruses” is often misconstrued to all infection’s computers may suffer, in pragmatism, it refers explicitly to a program that is adequately attached to another program (e.g., Word Document or spreadsheet) and can reduplicate itself. When the program is run, the virus replicates itself, attached to a new rubric. In time, a virus can bog a computer down to a wriggle. Viruses may also infect a boot sector or sector. These latter viruses are unethical to the sectors, making it not feasible to reboot the computer. At times viruses have built-in timers. They await an appropriate date and time(time-bombs), then do a programmed task like completely obliterating your hard drive. A generic way to detect these viruses is by transferring someone else’s infected files into your system or loading an infected file off cyberspace. Email viruses are somewhat like chalk and cheese. They bow out through email. You are specifically persuaded to open an attachment that will comprise the virus. Only by having an up-to-date virus scanner and meticulously managing unknown files which reasonably poise your computer is safe.

 

 

 


 

 

 

Source Author (2020)

 

COMPUTER WORMS

Worms cannot duplicate within a computer; however, they replicate by being transferred from one computer to another, either via a susceptibility in the system or via email. Like the computer virus, they can do an enormous hurt to a computer they infect. Except for not duplicating within cyberspace, they perform much like viruses and can be every bit as harmful. Also, like the viruses, you can only sentimentally become safe if you deploy a current update of excellent anti-virus software and be very meticulous about what programs you download and what email attachments you open.

TROJAN HORSES

 

Trojan horses penetrate your system by allowing them into your computer. Specifically, they show themselves as something they are NOT– a game, perchance. Once in your configuration, plethoric Trojan horses send data about your computer to remote locations. Hackers deploy through these “back door” Trojan horses consequently gain access to your system.

 

 


 

 


Source Author (2020)

 

 

 

SPYWARE

Spyware is a program that works much like a Trojan horse. People (often shareware authors) insert spyware into innocent-looking programs, and people load the files that contain the programs onto their computers. Once on your computer, the spyware will track your movements and purchasing patterns on the Internet. Companies collect the information and sell it as marketing databases. Spyware that collects only statistical information is not illegal. Nonetheless, when you have spyware loaded, you serve information from your computer to a remote location. Specialized spyware removal programs can remove it.

CRASHES

Viruses, worms, Trojan horses, and hackers can destroy your system with no notice. Furthermore, as your operating system becomes older, it tends to become buggy, and it can shut down. Technically speaking, "crashing" a computer refers to the hard drive failing, but it can also mean a board is burning up. Over time, it has come to denote any time your computer shuts down without notice. You should assume that your computer is going to crash. Maybe you get hacked and your computer ruined, or your copy of Photoshop overloads the system and shuts you down, or maybe you suffer a brownout. It does not matter much why the system shuts down; the question is, how do you protect yourself?

 

 

HACKERS AND CRACKERS





 Source Author (2021)

 

Our town is under destructive cyber-warfare. Urban vital infrastructure that encapsulates the electric grid, water networks, transportation systems, and public health and safety services are recurrently under siege targeted by cybercrimes. Urban vital infrastructure has been incrementing linked to cyberspace for the desideratum of exceptionally convenience and efficiency as part of the incrementing Industrial Internet of Things (HoT). Unfortunately, when deciding to link this configuration, their cybersecurity was taken for granted. A hacker can monitor, access, and alter these systems at their discretion because of the infrastructure's security deficiency. This is not only a matter of latent inopportuneness. Digital attacks of these instruments can have to obliterate tangible consequences.  The three steps town should take to prepare for cybercrimes and defend themselves accordingly. First, towns must appreciate how an attacker should make vulnerable its fundamental infrastructure. In the first discourse, I delineate and show a methodology for quantifying attack vectors across a town CCTV security system. The attacking approach deploys established cybersecurity typologies to craft an attack ruleset for an Al planner fashioned to perform attack generation. With this, towns can automatically identify all feasible tactics hackers can take to make their strategic infrastructure vulnerable.  Towns need to make urgent and vital their cyber risks. Cyber negotiation is one of the plethoric non-technical cyberdefense devices -Defensive Social Engineering, where those who suffered viral attacks can deploy social engineering against the hacker. Cyber negotiation encapsulates deploying a negotiation frame of reference to seclude attacks with steps urban strategic l infrastructure executors can take before, during and after an attack (Falco, 2018).

 

 

Hackers (breaking your system) depict themselves as varied from Crackers (also steal or do damage). Most people do not make such a difference. Most see a slight variation between entering your computer and managing all of your items, penetrating your home, managing all of your items, and pilfering some of them. Hackers have plethoric methods for seeking and accessing your computer. They might mass mail a Trojan horse, but they can also just run programs that ping all feasible IP addresses of your computer. When exposed and answers, the hacker may take his or her transgressing into your system. Computers have scores of portals visible to the Ethernet. Plethoric of them can tacitly be breached. A hacker with your IP address can navigate all of the ports until they get and open one. If you do not know you have cyber-security, penetrating your system can be very easy indeed. Once in your system, hackers may browse your files for private information about you and your credit.

Moreover, computers with firewalls that exclude them from the pinging are compelled to generate reports for each ping – thousands of reports for thousands of pings every few seconds. Since it is your computer and not the hacker’s, you are the one the authorities find and question. Computers attached to DSL connections, cable modems, or the Ethernet are specifically vulnerable to hacking and should be secluded with an up-to-date firewall (Bothra, 2019).

 

 An excellent example is the Commercial Crime International US which offered $ three million rewards for Russian hackers. The United States presented a three million reward – to the highest ever regarding cybercrime – for blowing a whistle on a Russian hacker indicted with bank conspiracy and fraud. Russian citizen Evgeniy Bogachev is indicted in the US with managing a computer attack network called Game over Zeus, which embezzled more than $100 million from online bank accounts. FBI investigations showed that the ‘Game over Zeus’ computer virus is accountable for one million computer corruptions. Other indictments of wire fraud, money laundering and computer fraud prevailed against Bogachev in several US courts. Bogachev allegedly trapped personas by gathering their monetary information through malevolent software (malware) that logged user’s keystrokes for passwords and bank PINs when the gullible fatalities entered their bank account information. It is also alleged that the same hacker is the one who engineered   Ransom ware Crypto Locker  U.S. corporates are anticipated to endure over 65,000 ransomware attacks  — and that is “a conservative number,” John Chambers, former CEO of Cisco Systems (CSCO), told Live With McDonald’s (MCD), JBS (JBSAY), and  Pipeline, electricity, road lights, fuel. All recently coming under blitzkrieg, Chambers does not construe an end to the blitzkrieg of cybersecurity blitzkrieg. He estimated that the quantum of ransomware attacks in 2021 could culminate as enormous as 100,000, with each one costing corporate and arithmetic $170,000.Chambers also enunciated the need for enterprises to enhance their recognition capabilities to safeguard the integrity of their private information and computing systems. He noted voice identification technology as one of the strategic tools for enterprises to ensure that only individuals with the proper credentials have access to their systems (Pandore, Mithare, Ghooke, & Sankla, 2017).

 

 


 

 Eavesdropping 

Source Author (2021)

 When participants were asked about ICT Challenges they encountered during the teaching and learning process, thirty-eight per cent were neutral, eighteen per cent disagreed, strongly disagreed, and strongly agreed that eavesdropping was a challenge. Eavesdropping is listening to interlocution without permission. The findings of this discourse are similar to the works of Falco, Viswanath and Caldera (2020). Eavesdropping should be construed in the context of passwords which is labelled as an adversary’s advances to learn the password by observing the user, getting a written copy of the password, or some analogous attack that encapsulates the tangible proximity of user and adversary.  Another feature of eavesdropping is keystroke logging (keylogging), in which dangerous hardware or software is deployed in the computer so that the attacker can use the user’s keystrokes for later analysis. A configuration that relies on plethoric determinants (e.g., password plus token or password plus biometric) is resilient to this type of attack. For a token, an equivalent threat is pilferage of the sign or tangible copying of the token.  Again, a plethoric protocol is resilient to this type of attack better than a pure token protocol. The equivalent threat for a biometric protocol is replicating or imitating the biometric parameter to produce the needed template.

Dynamic biometrics are less vulnerable to such attacks. For stationery biometrics, device authentication is a vital countermeasure. Replay attacks encapsulate an adversary recurring a previously captured user feedback. The most generic countermeasure to such attacks is the predicament-response protocol. The distributed computing ecosystem, the virtual private network (VPN), renders an attractive remedy to network administers. In essence, a VPN comprises a plethora of computers that interface through a relatively unsecure network and ensure the encryption and vital protocols to furnish security. At each corporate site, workstations, servers, and databases are connected by one or more local area networks (LANs) (Falco, ; Viswanath, ; Caldera, ,Shroe,, 2020). Cyberspace, some other public networks can be deployed to link sites, furnish a cost-saving over the deployment of a private network and offloading the complete area network administration task to the public network provider. That analogous public network furnishes an access path for telecommuters and other mobile staff to log on to enterprise configuration from remote sites. Nevertheless, the administrator faces a strategic requirement:  security.  Deployment of a public network unravels corporate traffic to eavesdropping and furnishes an entry point for illegal users. To fight this predicament, a VPN is required.     VPN deploys encryption and authentication in the lower protocol layers to furnish a secure link through an otherwise self-doubting network, archetypically cyberspace. VPNs are generic cheaper than real private networks deploying private lines but is incumbent upon having the analogous encryption and verification system at both ends. The encryption may be executed by firewall software or feasibly by routers. The most generic protocol mechanism deployed for this desideratum is at the IP level and is known as IPsec (Brown & STallings, 2019)

 

Denial of Service Attack

 

When participants were asked which of the following ICT Challenges are encountering during the teaching and learning process, eighteen per cent disagree and strongly disagree that Denial of Service Attack is an ICT challenge they encounter during the teaching and learning process. Twenty-seven per cent Strongly agree and Neutral that Denial of Service Attack is a challenge they encounter during teaching and learning.  Denial of Service Attackers may moot concealed directories within your computer that allows them to store (and even deliver) pornography or other information they do not want to be lined to their systems. Once in your system, hackers habitually deploy it to attack other systems. A hack attack on a computer will habitually pass through the plethora of “zombies" on their way. Another recurrent deployment of hackers for your computer is Denial of Service (DOS) attacks on other systems. These attacks are crafted to interrupt interfaces in enormous systems. For example, when hackers have accumulated adequate computers, they might have them all instantaneously ping the server in a business often as they are capable. The computer being pinged, compelled to answer the pings recurrently and becomes useless (Shuii, 2018)

.

  Denial of Service Attack




Source Author (2021)

Lack of Access

 When participants were asked if lack of access was a predicament during the teaching and learning process, most students strongly agree that there is a lack of access to computers. This provided a standard deviation of 1.2 and an arithmetic mean of four. The pronouncements of this research are similar to the works of Alvarez (2019), who posit that Technology is prevalent all around us and fathoming its role in the crafting and educational performance of learners is an incrementing concern for many educators. Access to home computers has been deduced to be steadily incrementing. This monograph sets out to verify the inequalities of academic performance that prevails among those juveniles with home computer access and those without. People surveyed embraced learners, with 35% of the students being Caucasians, and the median annual income reported to be $35,000-$45,000. Students were given access to school computers for six weeks and encouraged to use them for educational purposes. The findings show a minimal synopsis increase in learners' reading levels, insufficient intervention time, and further research. Unfortunately, not every home can furnish the necessary computers and related technology to their children. Due to deficiency of interest, fathoming, or opportunity, a so-called “digital divide” in computer access has resulted between those juveniles who have merits from computer technology and those underprivileged children who are progressively being left behind. This time series analysis has led to incrementing regard for those juveniles without home computer access to perchance be at a de-merit when it comes to improving school performance. Arguments for the deficiency of computer access at home, a strategic contributing factor being the socioeconomic status of families, depicts a latent for children of low-income families to execute at a lower educational level juxtaposed to their peers with computer access at home (Alvarez, 2019)

 


 

 

 

 


Source Author (2021)

 

 

 

 

 

Lac of funding, infrastructure, computers

 








Source Author 

 

 

Lack of funding

 

Nine per cent of the participants disagree, eighteen per cent were neutral, twenty-seven per cent agree, while forty-five per cent strongly agree that lack of funding is an ICT challenge that they encounter during the teaching and learning. Times are difficult for many schools in Namibia due to the COVID crisis and economic downturn. Lack of constituency development funds has been recognized as an obstacle to development. The councilor of Epukiro constituency in the Omaheke region, Vejama Kanguatjivi, uttered that his constituency is stressed to reach the pursued goals due to deficiency of much-needed funds (Ndjavela, 2020) Our ICT is one of several to be turned down for a strategic operating grant recently. Our grant application was among the eighty-three per cents that was rejected for funding according to our dismissal letter. Of course, many ICT research projects go unfunded — in Namibia and elsewhere — not because they lack excellence and merit, but because resources are scarce or the state’s commitment is insufficient, especially in this dire economic climate.

 

Nonetheless, I have a phobia that, as a young investigator commencing my ICT research programme, I am not a top priority for reviewers at the Namibian Institutes.  For the first time, I hear hushed talk among senior staff that well-established principal investigators may have to let ICT lab members go or even shut their doors in the coming months. In our lab, some of us may have to move on if we cannot soon acquire fellowships and other research grants to cover our salaries. I worry that Namibia regional and state governments are sending the wrong message to young researchers. Moreover, that means a more tenuous future for young health scientists in Canada — I included (Bougher, 2020).

 

Lack of infrastructure

 

Eight per cent of the participants disagree and are neutral that lack of infrastructures are ICT challenges they encounter during the teaching and learning process; fifteen per cent agree. In contrast, sixty-nine per cent strongly agree that lack of infrastructure is an ICT challenge that they are encountering during the teaching and learning process; the findings of this research are analogous to the monography of Shanmugam (2020). Information and Communication Technology has radicalised the concept of e- libraries. ICT has almost changed the universe into a global village. E-Libraries are also being radicalised to meet the users’ needs thrust upon them. The new generation whose demand for data never met is recurrently demanding that conventional ICT libraries be progressed as well-equipped and interlinked as computerized libraries. Public libraries are the requirements of society to train ordinary people about their rights and duties, spread the ecosystem of democracy, and teach the values and ethos among the people. One may find these infrastructures l at every level like state, provincial and district level. It meets every typical habitat living in the country. The people living in the villages may benefit from the public libraries to update the information about their states’ development and technological changes. Information and communication technology has ushered a vital role in the infrastructure sector. The application of ICT is vital for public libraries because these e-libraries disseminate information that is strategic for ordinary people (Shammugan, 2020).

 

Lack of computers

 

Eight per cent strongly disagree and disagree, while eighteen per cent agree, and sixty-nine per cent agree that the lack of computers are ICT challenges they encounter during the teaching and learning process. CBT is the instruction, by computer, of a self-paced instruction to a student. Yes, just like so much eLearning. The computer software occurs when a tutor executes the task of instruction more efficaciously (CBT is generally regarded as 50% faster than the appropriate classroom experience) and maybe more proficiently. The lack of computers affects CBT in Science (Hubbard, 2019).. Execution of computer-based information systems (CBIS) has become progressively vital due to the growing reliance on new technologies by enterprises in their operations and service delivery. (Hausbeit, 2020) There has also been the realisation by schools and businesses of the inevitability of rendering value-added services without computerized systems. A hindrance to these projects has been a lack of computers in schools. Despite this awareness and the conspicuous incrementing readiness to deploy computer-based systems, exists are a myriad of perennial challenges inhibiting the implementation of these systems. Computer-supported cooperative work (CSCW) merely delineates the technology that permits people within a delineated configuration to integrate through effective communication. This infrastructure is the integration of hardware and software meticulously selected to meet the peculiar need of the system. However, the lack of computers has affected the operation of computer-supported co-operative and the rendering of effective e-learning to students (Kinyanyui, 2020). Reitz-Larsen is tutoring computer science through mobility. The German-language and enterprise instructor found that correlating complex concepts such as algorithms and the binary system to learners’ interests assists the learners to grasp a topic that a plethora was leery about before they stepped into her class. The outcome came four years after President Barack Obama and other African leaders uttered that computer science is vital for K–12 students as reading, writing, and arithmetic. The declaration gave momentum to computer science-for-all mobility and propelled industry-backed non-profits such as code.org to the leadership of debates about what should be instructed in schools. Joe Biden, during his 2020 presidential campaign, emphasized has advocated t for having K–12 students learn the subject; however, lack of computers is hindering the project (Larsen, 2020)

 

 


 

Source Author (2020)

 

 

Lack of Mobile Network

Fifteen per cent strongly agree, fifty-four per cent agree, twenty-three per cent are neutral, and eight per cent disagree, fifteen per cent strongly agree that lack of mobile networks are ICT Challenges that they encounter during the teaching and learning process. Many public schools do not have sufficient immobile networks, so learners cannot take advantage of recent advances in mobile networks. Many incumbents upon “bring your device.” This has made multifarious the education IT ecosystem because schools end up with a myriad of devices and operating systems, making it complex to link hardware and link learners to each other. The result is an ICT “Tower of Babel” with interoperability predicaments and poor societies.

Furthermore, above all, “bring your apparatus” is only fine for those have who have devices. Those who do not are left behind, and the concept is not implementable when there is a lack of mobile networks in the area and school  (West, 2021). Mobile networks are deployed for other purposes, such as e-learning, than regular phone calls or   SMS   messaging.   Current software developments make it feasible to moot mobile social networks as crowdsourced early warning. However, mobile communications are quicker to monitor and handy than any other digital communication.  In this context, privacy and anonymity protocols need to be customised to fit mobile networks' diverse requirements and architectures. Presently, a quantum of applications already offers a diverse remedy to privacy and anonymity, but none of the prevailing   options was originally crafted for mobile networks and needed to be flexible to this new context. (Poblet & Torralba, 2021)

 

 




Source Author (2021)

Conclusion 

Participants were asked to rank the E-learning enigmas in terms of damage and impact on the learning process; nine per cent of the participants highlighted that it was high with 75% impact. Also, the same percentage indicated it was low with 25%, the exact percentages of 9% also indicated it was shallow with 0% impact The highest percentage of 45% indicated that the impact is moderate with 50% impact. The remaining 27% asserted that it was very high with one hundred per cent impact. In a nutshell, the impact of hacking on eLearning is moderate to a vast continuum scale. The Hackers can be taxonomised as Black, White & Grey White Hat. Hackers are legalized and salaried by the corporates, with excellent thinking. They work with the notion to create revenue intentions for others. They are also called “ICT Technicians”. These are designated for the betterment of the enterprise. The corporate may deploy them to evaluate their security to check the robustness of security and enhance it. They make inputs on their ambiguities and make security robust. Ethical hackers belong to this taxonomy. For ex- they hack into malicious groups for excellent reasons. An epitome for white hat hackers is shown in Black Hat Hackers; They are also labelled as crackers or malicious hackers. They target banks or other enterprises with inadequate security and steal money or credit card information. They crash all the security and make the network less secure and pilferage all precious information. It is recommended that the state should put in place countermeasures against illegal hacking.








No comments:

Post a Comment

Professor David Mpunwa