1887
Volume 2022, Issue 2
  • E-ISSN: 2616-4930

ملخص

Previous researchers have failed to situate seemingly important components of contemporary real-life truth in the mainstream of investigations. As new modes of transferring knowledge, accessing, and retrieving information emerge, resources and technology advance, and webinars are becoming one of the easiest and cheapest ways to reach the public, synchronously or asynchronously. Many online meeting tools, regarded as windows to the future of communication and imparting knowledge, are evolving rapidly. However, webinar sites tend to help viewers or listeners register on the websites and even provide favorable conditions to make the audience feel safe. In doing so, others join the webinars with a sole aim of tapping important information from the public, thus making the webinars niches or blossomed trees for cybercriminals. The fact is that what causes the presence of cybercriminals is logically no different from what can reverse it. This study attempts to review the literature that can change the way people view webinars. It aims to develop new ways of thinking about emerging new systems, respond to change, use knowledge to change the way abnormal behavior occurs during webinar series and open unattended ways to expand the spectrum of anomalous detection mechanisms from many perspectives.

Loading

جارٍ تحميل قياسات المقالة...

/content/journals/10.5339/jist.2022.11
٢٠٢٢-٠٩-٣٠
٢٠٢٤-٠٧-٢٢
Loading full text...

Full text loading...

/deliver/fulltext/jist/2022/2/jist.2022.11.html?itemId=/content/journals/10.5339/jist.2022.11&mimeType=html&fmt=ahah

References

  1. ACS. Cybersecurity Guide. (2016). Cybersecurity, threats, challenges, opportunities. http://www.slis.kent.edu/∼mzeng/metadata/Gilland.pdf .
    [Google الباحث العلمي]
  2. Aggarwal, C.C., & Yu, P.S. (2001) Outlier detection for high dimensional data. Proceedings of the ACM SIGMOD Conference 2001.
  3. Akbulut, Y. (2007). Effects of multimedia annotations on incidental vocabulary learning and reading comprehension of advanced learners of English as a foreign language. Instructional Science, 35:(6), 499–517.
    [Google الباحث العلمي]
  4. Austin, L. (2003). Privacy and the question of technology. Law and Philosophy, 22:(2), 119–166.
    [Google الباحث العلمي]
  5. Baah, G.A., Gray, A., & Harrold, M.J. (2006). On-line anomaly detection of deployed software: A statistical machine learning approach. https://www.researchgate.net/publication/221388373, https://doi.org/10.1145/1188895.1188911.
    [Google الباحث العلمي]
  6. Bada, M., & Nurse, J.R.C. (2020). The social and psychological impact of cyber-attacks. In V.
    [Google الباحث العلمي]
  7. Benson, & J. McAlaney (Ed.), Emerging cyber threats and cognitive vulnerabilities. Academic Press.
    [Google الباحث العلمي]
  8. Barnett, V., & Lewis, T. (1994).Outliers in statistical data (3rd ed.). John Wiley & Sons.
  9. Besnerais, J.L., Devillers, E., & Toubin, H. (2020).Electromagnetic noise and vibrations in electromagnetic webinar 7/8: Magnetic noise reduction of electrical machines using MANATEE Software. 2020 EOMYS ENGINEERING. www.eomys.com.
  10. Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009). All your contacts are belong to us?: Automated identity theft attacks on social networks. International Conference on World Wide Web, 18:(1), 551–560.
    [Google الباحث العلمي]
  11. British Library. (2010).2020 Vision Project: Size, scope and use of British Library collection. Internal Discussion Paper.
  12. Burgoon, J.K., Parrott, R., LePoire, B.A., Kelley, D.L., Walther, J.B., & Perry, D. (1989). Maintaining and restoring privacy through communication in different types of relationship. Journal of Social and Personal Relationships, 6:(2), 131–158.
    [Google الباحث العلمي]
  13. Burton, D., & Kitchen, T. (2010). Online videoconferencing products: Update. The International Review of Research in Open and Distance Learning, 12:(2), 157–165.
    [Google الباحث العلمي]
  14. Carreño, A., Inza, I., & Lozano, A. (2020). Analyzing rare event, anomaly, novelty, and outlier detection terms under the supervised classification framework. Artificial Intelligence Review, 53:(1), 3575–3594. https://doi.org/10.1007/s10462-019-09771-y.
    [Google الباحث العلمي]
  15. Choo, C.W. (2001). Environmental scanning as information seeking and organizational learning. Information Research, 7:(1), 1–25.
    [Google الباحث العلمي]
  16. Company Webcast (n.d.). What is a webinar? https://www.webinar.nl/en/webinars/what-is-a-webinar/ .
    [Google الباحث العلمي]
  17. Cornelius, S. (2014). Facilitating in a demanding environment: experiences of teaching in virtual classrooms using web conferencing. British Journal of Educational Technology, 45:, 260–271.
    [Google الباحث العلمي]
  18. Culcasi, I., & Cinque, M. (2020).Online meeting toolkit: How to create effective online events. http://cimea.it/webinar/ONLINEMEETINGTOOLKIT_singole.pdf.
    [Google الباحث العلمي]
  19. DeCew, J. (1997).In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press, Ithaca.
    [Google الباحث العلمي]
  20. Department for Digital, Culture, Media and Sport (2020). Cyber security breaches survey 2020: Statistical release.
    [Google الباحث العلمي]
  21. Dervin, B. (1998). Sense-making theory and practice: An overview of user interests in knowledge seeking and use. Journal of Knowledge Management, 2:(2), 36–46.
    [Google الباحث العلمي]
  22. Dietterich, T., Fern, A., Wong, W.K., Battacharyya, S., Mondal, D., Emott, A., Das, S.,.
  23. Garrepalli, R., Juozapaitis, Z., Liu, S., Siddiqui, M.A., & Zemicheal, T. (2018).Anomaly detection: Algorithm, explanation, and applications. https://www.youtube.com/watch?v = 12Xq9OLdQwQ .
    [Google الباحث العلمي]
  24. Dijle, H. (2006).Türkiye'de eğitimli insanların bilişim suçlarına yaklaşımı. Yayınlanmamış Yüksek Lisans Tezi, Gazi Üniversitesi Fen Bilimleri Enstitüsü.
  25. Dousay, T.A. (2016). Effects of redundancy and modality on the situational interest of adult learners in multimedia learning. Educational Technology Research and Development, 64:(6), 1251–1271.
    [Google الباحث العلمي]
  26. Ebner, C., & Gegenfurtner, A. (2019). Learning and satisfaction in webinar, online, and face-to-face instruction: A meta-analysis. Frontiers in Education, 4:(92), 1–11. https://doi.org/10.3389/feduc.2019.00092.
    [Google الباحث العلمي]
  27. Farley, T. (2015). Introduction. In M. Rosenquist (Ed.) Navigating the digital age: The definitive cybersecurity guide for directors and officers. Caxton: Business & Legal Incorporation.
    [Google الباحث العلمي]
  28. Ferguson, R. (2010). Peer interaction: The experience of distance students at a university level. Journal of Computer Assisted Learning, 26:(6), 574–584.
    [Google الباحث العلمي]
  29. Gegenfurtnera, A., & Ebner, C. (2019). Webinars in higher education and professional training: A meta-analysis and systematic review of randomized controlled trials. Educational Research Review, 28:(100293). https://doi.org/10.1016/j.edurev.2019.100293.
    [Google الباحث العلمي]
  30. GoToWebinar. (2017).The 2017 Big Book Of Webinar Stats: The marketer's source for webinar trends, stats and best practices. https://assets.cdngetgo.com/e7/73/cbeb606b4f9295747b31e0442f24/gotowebinar-2017-big-book-of-webinar-stats.pdf.
  31. He, S., Zhu, J., He, P., & Lyu, M.R. (2016). Experience report: System log analysis for anomaly detection. 2016 IEEE 27th International Symposium on Software Reliability Engineering. https://doi.org/10.1109/ISSRE.2016.21.
    [Google الباحث العلمي]
  32. Heikkilä, J. (2018).Benefits of audiovisual memory encoding across the life span. Department of Psychology and Logopedics, Faculty of Medicine University of Helsinki, Finland.
  33. Hetcher, S.A. (2002).Cyberian signals. 36, U. Rich. L. Rev. 327. http://scholarship.richmond.edu/lawreview/vol36/iss2/2 .
  34. Hjørland, B. (2009). The foundation of the concept of relevance. Journal of the American Society for Information Science and Technology, 61:(2), 217–237. https://doi.org/10.1002/asi.21261.
    [Google الباحث العلمي]
  35. Hodge, V.J., & Austin, J. (2004). A survey of outlier detection methodologies. Artificial Intelligence Review, 22:(2), 85–126..
    [Google الباحث العلمي]
  36. Hrastinski, S.A. (2009). A theory of online learning as online participation. Computers & Education, 52:(1), 78–82.
    [Google الباحث العلمي]
  37. Huss, N. (2022).How many websites are there in the world? https://siteefy.com/how-many-websites-are-there/#How-Many-Websites-Are-There .
    [Google الباحث العلمي]
  38. John, G.H. (1995). Robust decision trees: Removing outliers from databases. Proceedings of the First International Conference on Knowledge Discovery and Data Mining. Menlo Park, CA, pp. 174–179, AAAI Press.
    [Google الباحث العلمي]
  39. Johnson, C.L., & Schumacher, J.B. (2016). Does webinar – based financial education affect knowledge and behavior? Journal of Extension, 54:(1). https://tigerprints.clemson.edu/joe/vol54/iss1/19.
    [Google الباحث العلمي]
  40. Library Journal. (2014).Survey of e-book usage in U.S. public libraries(5th Annual Survey). chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://s3.amazonaws.com/WebVault/ebooks/LJSLJ_EbookUsage_PublicLibraries_2014.pdf .
  41. Lynch, J. (2005). Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks. Berkeley Technology Law Journal, 20:(259), 259–300.
    [Google الباحث العلمي]
  42. Maharjan, N. (2020).Web-based anomaly detection using machine learning. https://www.researchgate.net/publication/354555312 .
  43. Mayor, R.E. (1990). Multimedia instruction. In J. Spector, M. Merrill, J. Elen, & M. Bishop (Eds), Handbook of research on educational communications and technology. New York, NY, USA: Springer.
    [Google الباحث العلمي]
  44. Mayor, R.E., & Anderson, R.B. (1992). The instructive animation: Helping students build connections between words and pictures in multimedia learning. Journal of Educational Psychology, 84:(4), 444–452.
    [Google الباحث العلمي]
  45. Mayor, R.E., & Gallini, J.K. (1990). When is an illustration worth ten thousand words? Journal of Educational Psychology, 82:(4), 715–726.
    [Google الباحث العلمي]
  46. McAfee. (2018).The economic impact of cybercrime—no slowing down. https://www.mcafee.com/enterprise/en-us/solutions/lp/economics-cybercrime.html .
  47. Mussaui-Ulyanishcheva, E.V., & Zakharova, E.V. (2020). Impact of student participation in webinars on increasing motivation to learn. Universal Journal of Educational Research, 8:(12), 6953–6959. https://doi.org/10.13189/ujer.2020.081262.
    [Google الباحث العلمي]
  48. Nahl, D. (2005). Affective load. In K.E. Fisher, S. Erdelez, & L.E.F. McKechnie (Eds).Theories of information behaviour. American Society for Information Science and Technology.
    [Google الباحث العلمي]
  49. Ogutcu, G., Cirakoglu, O.C., & Cula, S. (2016). Information security in the world of digital natives: How internet addiction, sensation seeking and information security behaviours are related. International Journal of Management and Applied Science, 2:(9), 79–84.
    [Google الباحث العلمي]
  50. Paine, C., Reips, U.D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet users’ perception of privacy concerns and privacy actions. International Journal of Human-Computer Studies, 65:(6), 526–536.
    [Google الباحث العلمي]
  51. Pearson, H.C., & Wilbiks, J.M.P. (2021). Effects of audiovisual memory cues on working memory recall. Vision, 5:(14), 1–10. https://doi.org/10.3390/vision5010014 .
    [Google الباحث العلمي]
  52. Polanco-Bueno, R. (2013). Blogs, webinars and significant learning: A case report on a teacher-training program for college teachers. Higher Learning Research Communications, 3:(1), 56–67. http://dx.doi.org/10.18870/hlrc.v3i1.72 .
    [Google الباحث العلمي]
  53. Polanco, R., & Merino, I.L. (2011, March). Blog and Webinar as distance significant Learning building tools: A global learning experience for higher education professors. Paper presented at the 6 th International Technology, Education and Development Online Conference.
    [Google الباحث العلمي]
  54. Prenksy, M. (2001). Digital natives, digital immigrants. On the Horizon, 9:(5). http://www.marcprensky.com/writing/Prensky%20%20Digital%20Natives,%20Digital%20immigrants%20-%20Part1.pdf .
    [Google الباحث العلمي]
  55. Prince, M. (2004). Does active learning work? Journal of Engineering Education, 93:(3), 223–231. http://dx.doi.org/10.1002/j.2168-9830.2004.tb00809.x .
    [Google الباحث العلمي]
  56. Raytheon, Forcepoint and the National Cyber Security Alliance (2017). Securing our future: Cybersecurity and the millennial workforce. A study commissioned by Raytheon, Forcepoint and the National Cyber Security Alliance about security practices in the new workforce and preparedness for cybersecurity careers among young adults in nine countries. https://www.raytheon.com/sites/default/files/2017-12/2017_cyber_report_rev1.pdf .
  57. Rousseeuw, P., & Leroy, A. (1996).Robust regression, and outlier detection (3rd ed.). John Wiley & Sons.
  58. Scheiderer, J. (n.d.).What's the difference between asynchronous and synchronous learning? Ohio State Inline. https://online.osu.edu/resources/learn/whats-difference-between-asynchronous-and-synchronous-learning .
  59. Shrivastava, A. (2020). Identity theft in cyberspace with special reference to India. Pen Acclaims, 8, 1–5. www.penacclaims.com .
    [Google الباحث العلمي]
  60. Solove, D.J. (2004).The digital person. Technology and privacy in the information age. New York: NYU Press.
  61. Soroya, S.H., & Ameen, K. (2020). Subject-based reading behaviour differences of young adults under emerging digital paradigm. Libri: International Journal of Libraries & Information Services, 70:(2), 2–11.
    [Google الباحث العلمي]
  62. Statista. (2018a).eBooks: United States. https://www.statista.com/outlook/213/109/ebooks/unitedstates.
  63. Statista. (2018b).Forecast of epublishing revenue by Segment Worldwide from 2017 to 2023 (In Million U.S. Dollar). Retrieved March 20, 2020, from https://www.statista.com/statistics/456813/dig ital-publishing-revenue-format-digitalmarket-outlook-worldwide/.
  64. Sura, K., Lischalk, J.W., Leckie, J., Welsh, J.S., & Fernandez, E. (2017). Webinar-based contouring education for residents. Journal of the American College of Radiology, 14:(8), 1074–1079.
    [Google الباحث العلمي]
  65. Symantec Corporation. (2019).ISTR: Internet Security Threat Report. Symantec Corporation. https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf.
  66. Tindall-Ford, S., Chandler, P., & Sweller, J. (1997). When two sensory modalities are better than one. J. Exp. Psychol., 3:(4), 257–287.
    [Google الباحث العلمي]
  67. Velayo, R.S. (1993).Retention of visual and verbal content and perceived self-competence in audiovisual instruction. https://www.researchgate.net/publication/323858956_Retention_of_visual_and_verbal_content_and_perceived_self-competence_in_audiovisual_instruction .
  68. Warren, S., & Brandeis, L.D. (1890).The right to privacy. Harvard Law Review, 5. http://www.lawrence.edu/fast/boardmaw/Privacy_brand_warr2.html.
  69. Webinar Software (2022). Detailed webinar guides and expert advice. 80+ Practical webinar statistics – Optimize for success in 2022. https://www.webinarsoftware.org/webinar-statistics/.
    [Google الباحث العلمي]
  70. Westin, A. (1967).Privacy and freedom. New York: Atheneum.
  71. Wu, T.H. (2017).Network anomaly detection. Report. Hong Kong: Department of Computer Science, The University of Hong Kong.
/content/journals/10.5339/jist.2022.11
Loading
  • نوع المستند: Research Article
الموضوعات الرئيسية anomaly detectioncybersecurityLibrarianshipsupervised and unsupervised anomaly detection and webinar
هذه الخانة مطلوبة
يُرجى إدخال عنوان بريد إلكتروني صالح
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error