The usage of the VM apps poses a degree of vulnerability to multiple privacy and safety risks. Within this article are presented certain aspects related to the usage of such apps, what to consider when using them during the training procedure and video meetings. The date gathered based of this paper on the analysis of VM applications, the establishment of some common characteristics, their most important and useful characteristics have been highlighted. Videoconference apps have been successfully used within training sessions during the pandemic, without taking into consideration the security, privacy and massage of such technological tools. A survey was conducted on the security and vulnerability aspects of the applications used by the teacher. It was sought the degree of knowledge of these problems. It was seen that the discussions held in video format occupy over 60% of the multimedia methods used in online classes. The exceptional utilization increased utilization of VM apps, it should be noted that cyber security problems connected to such techniques should be given an increased attention. One cannot imagine a teaching-learning procedure without having an online video meeting. As such, in the following chapter, are detailed solutions for teleconferences and the security aspects adherent to such and we conducted on the degree of use of VM applications, the application of security techniques and recommendations for a better application of VM applications.
Published in | American Journal of Software Engineering and Applications (Volume 11, Issue 2) |
DOI | 10.11648/j.ajsea.20221102.12 |
Page(s) | 31-37 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2022. Published by Science Publishing Group |
Education, Video Conferencing, Privacy, Abuse, Security
[1] | Ali A. H., George L. E., Mokhtar M. R. An Adaptive High Capacity Model for Secure Audio Communication Based on Fractal Coding and Uniform Coefficient Modulation. Circuits, Syst. Signal Process., vol. 39, no. 10, pp. 5198-5225, 2020. |
[2] | Chakraborty P., Mittal P., Gupta M. S., Yadav S., Arora A. Opinion of students on online education during the COVID-19 pandemic, Hum. Behav. Emerg. Technol., vol. 3, no. 3, p. 357-365, 2020. |
[3] | Chawla Ajay, Coronavirus (COVID-19). ‘Zoom’ Application Boon or Bane, 2020. 10 p. Available at SSRN: https://ssrn.com/abstract=3606716. |
[4] | Costinela - Luminita D. Information security in E-learning Platforms. Procedia - Social and Behavioral Sciences, 15, 2011. |
[5] | Diesch R., Pfaff M., Krcmar H. A comprehensive model of information security factors for decision-makers, Comput. Secur., vol. 92, 2020. |
[6] | Eck C. J., Dale Layfield K., Dibenedetto C. A., Gore J. School-Based Agricultural Education Teachers Competence of Synchronous Online Instruction Tools During the COVID-19 Pandemic, Journal of Agricultural Education, vol. 62, no. 2, pp. 137-147, 2021. |
[7] | Isobe T., Ito R. Security Analysis of End-to-End Encryption for Zoom Meetings, in IEEE Access, vol. 9, pp. 90677-90689, 2021. |
[8] | Kagan D., Alpert G. F., Fire M. Zooming Into Video Conferencing Privacy and Security Threats, Cryptography and Security, 2020. |
[9] | Karim N. A., Shukur Z. “Review of User Authentication Methods in Online Examination,” Asian J. Inf. Technol., vol. 14, no. 5, 2015, p. 166-175. |
[10] | Li C., Lalani F. The COVID-19 pandemic has changed education forever. This is how. World Economic Forum Covid Action Platform, 2020. Available: https://www.weforum.org/agenda/2020/04/coronavirus/education-global-covid19-online-digital-learning/ |
[11] | Lynne Coventry. Video Conferencing in Higher Education. https://www.nyu.edu/content/dam/nyu/facultyResources/documents/ESMITS/vc_in_higher_education.pdf |
[12] | Mehta, Jay et al. “Rapid implementation of Microsoft Teams in response to COVID-19: one acute healthcare organization’s experience.” BMJ health & care informatics vol. 27, 3 (2020). |
[13] | Nader Abdel Karim, Ahmed Hussain Ali. E-learning virtual meeting applications: A comparative study from a cybersecurity perspective. Indonesian Journal of Electrical Engineering and Computer Science Vol. 24, No. 2, 2021, p. 1121-1129. |
[14] | Oeppen S., Shaw G., Brennan P. A. Human factors recognition at virtual meetings and video conferencing: how to get the best performance from yourself and others, British Journal of Oral and Maxillofacial Surgery, Volume 58, Issue 6, 2020, p. 643-646. |
[15] | Paolo Prinetto and Gianluca Roascio. Hardware Security, Vulnerabilities, and Attacks: A Comprehensive Taxonomy. http://ceur-ws.org/Vol-2597/paper-16.pdf |
[16] | Peter Abrahamsson Lindeblad, Yuliya Voytenko, Oksana Mont, Peter Arnfalk. Organizational effects of virtual meetings, Journal of Cleaner Production XXX, 2015, p. 1-11. |
[17] | Raan Saeed Al-Maroof, A. Salloum, Aboul Ella Hassanien, Khaled Shaalan. Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic. Interactive Lerning Environments. 2020. |
[18] | Ravinder Singh, Soumya Awasthi. Updated Comparative Analysis on Video Conferencing Platforms- Zoom, Google Meet, Microsoft Teams, WebEx Teams and GoToMeetings. EasyChair Preprint nr. 4026, 2020. |
[19] | Rubinger L. et. al., Maximizing virtual meetings and conferences: a review of best practices. Int. Orthop., vol. 44, no. 8, pp. 1461-1466, 2020. |
[20] | Secara Ion-Alexandru. Zoombombing – the end-to-end fallacy, Network Security VOL. 2020, NO. 8 2021. |
[21] | Vanessa Y. Oviedo, Jean E. Fox Tree. Meeting by text or video-chat: Effects on confidence and performance. Computers in Human Behavior Reports. Volume 3, 2021, 100054 p. |
[22] | Wlodarczyk, Jordan R. M. D., Wolfswinkel, Erik M. M. D., Carey, Joseph N. M. D. Coronavirus 2019 Video Conferencing: Preserving Resident Education with Online Meeting Platforms. Plastic and Reconstructive Surgery, Volume 146, Number 1, 2020. p. 110-111. |
[23] | Yoshiyasu Takefuji. Resilient Secured Education System for Online Lectures During the Pandemic, Journal of Applied Security Research, 2021. |
[24] | Zgureanu A. Security aspects of video conferencing services. Culegere de articole ştiinţifice ale Conferinţei Ştiinţific Internaţional “Competitivitate şi Inovare în economia cunoaşterii”, Ediţia a XXII-a, 2, Chişinău, 2020. |
[25] | Zoom, “Zoom, Help Center,” 2020. Available: https://support.zoom.us/hc/en-us/articles/201362153-Sharing-your-screen-content-or-second-camera |
[26] | Google Support, “Google Meet Security & Privacy for users,” 2020. Available: https://support.google.com/meet/answer/9852160?hl=en#:~:text=All%20data%20in%20Meet%20is,encrypted%20at%20rest%20by%20default |
[27] | Microsoft, “Microsoft Docs,” 2020. Available: https://docs.microsoft.com/en-us/welcome-to-docs |
[28] | Google Support, “Advanced phishing and malware protection Google Workspace Admin Help,” 2021. Available: https://support.google.com/a/answer/9157861?hl=en |
[29] | https://economedia.ro/ins-in-2021-circa-8-din-10-dintre-gospodariile-din-romania-au-acces-la-internet.html |
[30] | https://www.unicef.org/moldova/media/3961/file/EVALUARE.html |
APA Style
Biclea Diana. (2022). The Fundamental Use of Videoconferencing in Online Teaching. American Journal of Software Engineering and Applications, 11(2), 31-37. https://doi.org/10.11648/j.ajsea.20221102.12
ACS Style
Biclea Diana. The Fundamental Use of Videoconferencing in Online Teaching. Am. J. Softw. Eng. Appl. 2022, 11(2), 31-37. doi: 10.11648/j.ajsea.20221102.12
@article{10.11648/j.ajsea.20221102.12, author = {Biclea Diana}, title = {The Fundamental Use of Videoconferencing in Online Teaching}, journal = {American Journal of Software Engineering and Applications}, volume = {11}, number = {2}, pages = {31-37}, doi = {10.11648/j.ajsea.20221102.12}, url = {https://doi.org/10.11648/j.ajsea.20221102.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajsea.20221102.12}, abstract = {The usage of the VM apps poses a degree of vulnerability to multiple privacy and safety risks. Within this article are presented certain aspects related to the usage of such apps, what to consider when using them during the training procedure and video meetings. The date gathered based of this paper on the analysis of VM applications, the establishment of some common characteristics, their most important and useful characteristics have been highlighted. Videoconference apps have been successfully used within training sessions during the pandemic, without taking into consideration the security, privacy and massage of such technological tools. A survey was conducted on the security and vulnerability aspects of the applications used by the teacher. It was sought the degree of knowledge of these problems. It was seen that the discussions held in video format occupy over 60% of the multimedia methods used in online classes. The exceptional utilization increased utilization of VM apps, it should be noted that cyber security problems connected to such techniques should be given an increased attention. One cannot imagine a teaching-learning procedure without having an online video meeting. As such, in the following chapter, are detailed solutions for teleconferences and the security aspects adherent to such and we conducted on the degree of use of VM applications, the application of security techniques and recommendations for a better application of VM applications.}, year = {2022} }
TY - JOUR T1 - The Fundamental Use of Videoconferencing in Online Teaching AU - Biclea Diana Y1 - 2022/09/16 PY - 2022 N1 - https://doi.org/10.11648/j.ajsea.20221102.12 DO - 10.11648/j.ajsea.20221102.12 T2 - American Journal of Software Engineering and Applications JF - American Journal of Software Engineering and Applications JO - American Journal of Software Engineering and Applications SP - 31 EP - 37 PB - Science Publishing Group SN - 2327-249X UR - https://doi.org/10.11648/j.ajsea.20221102.12 AB - The usage of the VM apps poses a degree of vulnerability to multiple privacy and safety risks. Within this article are presented certain aspects related to the usage of such apps, what to consider when using them during the training procedure and video meetings. The date gathered based of this paper on the analysis of VM applications, the establishment of some common characteristics, their most important and useful characteristics have been highlighted. Videoconference apps have been successfully used within training sessions during the pandemic, without taking into consideration the security, privacy and massage of such technological tools. A survey was conducted on the security and vulnerability aspects of the applications used by the teacher. It was sought the degree of knowledge of these problems. It was seen that the discussions held in video format occupy over 60% of the multimedia methods used in online classes. The exceptional utilization increased utilization of VM apps, it should be noted that cyber security problems connected to such techniques should be given an increased attention. One cannot imagine a teaching-learning procedure without having an online video meeting. As such, in the following chapter, are detailed solutions for teleconferences and the security aspects adherent to such and we conducted on the degree of use of VM applications, the application of security techniques and recommendations for a better application of VM applications. VL - 11 IS - 2 ER -