Friday 30 December 2016

Social Media and its Impact on Education

Are today’s students tweeting their way to better grades? Not really. However, at least, nine out of ten people hold one of these social media accounts like Instagram, Twitter, Tumblr and Facebook.
There are big differences in the patterns of use  from one social media site to another. Facebook is the most visited site and the one with highest rate of postings. YouTube is the second most visited but posting rates are low. While most of us only think about the negative effects of social media which includes cyber bullying, internet addiction etc, we tend to forget that social media is here to stay and there could be a positive upside, too.

A real time example of this use of social media was illustrated by one of my professors during our Microprocessor class. As soon as the class got over, the professor would give us a problem to solve along with a dedicated hashtag like ‘#EE3Micro’ and asked us to post our solutions on Facebook with the particular hashtag. Now just with one hashtag search, professor and students were both able to see all the solutions. This helped the students in figuring out many different approaches to tackle a single problem without point to point communication with their peers.

Setting up hash tags for individual courses to create online discussion communities for their students not only  allows the students to tag their academic posts, and view submissions to see what has been collectively produced but this strategy provokes more thoughtful responses from the students.When students know that their posts can be read not only by their peers but also by their professors, they not only pay more attention on what to say, but take more care of their grammar, spelling and punctuation. 

Social media is all about collaborating, networking, sharing knowledge and content. Thereby, it can be used as a tool to reduce the communication gap that exists in our day to day classroom activities. Use of social media is not without its problems. The two most important concerns about use of social media are privacy and integrity. In spite of these concerns, people believe that social media offers value in teaching and learning.

Social media makes it easier and convenient to access and provide information. Teachers and students remain connected with each other. Professors have started discussion forums by creating groups on Facebook, where students can post their queries, ideas and doubts. This also helps them by inculcating peer learning in their lives. These groups are also helpful to students who shy away from asking questions during classroom sessions. Besides making their work easy, another reason behind professors adopting this social media approach is to create a branding for them professionally. Facebook pages, twitter accounts, various blogs are highly accessed and hence can help professors in getting a high reputation. I guess everyone wants to get known for their work while working!

In every college and university, social media is being integrated in every way possible, including admissions, campus life, alumni relations and in the classrooms. If we are missing out  on the usage of social media, we are pushing away a lot potential audience. It is rightly said, “We live in a digital ecosystem, and it is vital that educational institutions adopt it”.

This article is written by Harpal Singh, an intern with the E-QUAL - Jadavpur University team. He is a final year student of Electrical Engineering at Jadavpur University, Kolkata.


Monday 5 December 2016

Ethical Hacking and Data Security

As time progresses, so do we. We have come a long way from the time when postmen used to deliver mails to us and it took weeks to send messages. Even the early stage of development of computers seems a long way back. At present, we have very fast and efficient processors and internet, a large computer network around us which enables us in sharing information and communication within a few seconds. With such a great advancement, we have become so accustomed to the technology around us that it is difficult to imagine a life without it. But with the benefits we take advantage of, there are many weak links in the technology that we use; and those weaknesses can be easily exploited.

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorized access to or control over computer network security systems for some illicit purpose. This is one of the many definitions. Hacking and related cyber-crimes are rampant nowadays.  In times like these, it is very important to keep oneself safe from these crimes. Here comes the necessity of ethical hacking.

An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit. Just as diamond cuts diamond, malicious hacking attempts on a system can be prevented by ethical hacking, that is letting ethical hackers attack the system under owner’s supervision to find out the security flaws. They use the same techniques to test and bypass a system's securities as their criminal counterparts. Instead of taking advantage of any vulnerabilities found, they provide advice on how to fix them so that the organization can improve its overall security. 

Ethical hacking first started in around 1970s, when the US government used groups of professional called “Red Teams” to hack its own computer systems. Since then, it has expanded into a big market as we live in a digital age where technology and internet have become inseparable parts of our lives. Staying connected to the internet lets any organization connect with the whole world. Here comes the need to get their systems tested and making changes wherever required so that they function without hindrances.

But why do we actually need ethical hacking? What are we actually protecting? The answer is data. Everything we do online either creates data or uses and modifies already created data. For example, the banking system stores financial information of its customers and databases for the social media contain users’ personal information. Cyber-crimes happen to either steal that data or destroy it. To manage these data, we have database management systems and to protect it, we implement security measures. Data security is the main priority for organizations of every type. Examples of data security technologies include disk encryption, backups, data masking and accidental or deliberate data deletion. 

One of the emerging advancement in the field of education, online learning and Massive Open Online Courses (MOOCs), have eased the availability of quality education to the masses. Their reach and importance have been increasing gradually. Employability on the basis of online certification is also becoming more acceptable with time. For this reason, data security becomes extremely important when it comes to hosting and opting for MOOCs. Now the question is, what are the risks involved? There are problems such as plagiarism and data misuse but another more important security issue related to online learning is inconsistent user authentication. This means that a malicious hacker could pose as someone who is a registered user of a course. After gaining access to the user’s account, the hacker could disrupt the course progress or plagiarize the contents, but more gravely than those, s/he could steal the certificates.

Security vulnerabilities are commonly found in Learning Management System (LMS).  LMS helps educators create online dynamic web contents for students. One such popular LMS is Moodle which is open source, which means it is available by anyone for download free of cost. To ensure the security of the users, some MOOC platforms such as Coursera have developed identification mechanisms based on keystroke biometrics like typing patterns. However these mechanisms can be unreliable and privacy intrusive. An approach to solve this is Secure Learning Management System (SLMS) that uses the security properties of a Public Key Infrastructure. Educational Data Mining techniques are also used to extract knowledge from large data sets of the log files in the MOOC platforms. These information include IP addresses, timestamp, user navigation etc. and can be used to build a model for user authentication.   

These advancements do surely help in dealing with the crimes against data security in every aspect of technology, but more importantly, people need to be made aware and informed about the risks that arise with the use of new technology. This awareness is the first and essential step towards the security of the important data one hosts in and shares with the digital world.

This article is written by Aditya, an intern with the E-QUAL - Jadavpur University team. He is a final year student of Electrical Engineering at Jadavpur University, Kolkata.