Wednesday, May 6, 2020
Cognition and Communication Research â⬠Free Samples for Students
Question: Discuss about the Cognition and Communication Research. Answer: Introduction: The main the problem is that the social networking sites obtain the information about the users that are only available from their databases (Zikmund et al. 2014). And hence, the original existence of the person is unknown and hence the real existence of the persons can be actually detected if there was a biometric system for detecting the physical existence of the person. Due to the increase in the cybercrimes and the rate of the mal practices increase in the world (Schwarz 2014). There has been a great evolution in the field of hacking and the techniques regarding hacking. In addition to this, the main target of the hackers have the social networking websites and hence, the need for the project has been raised and this has been the factor for taking up the project. The problem is relevant because the problem is related with the piracy of the data. The users upload their personal details which can easily fall into the hands of the hackers. In addition to this the biometrics system would help in the proper identification of the hackers or the person who is intending to commit the mal practices (Robertson et al. 2013). Hence, the problem is very apt and relevant. The problems have validated by study of various type of article and newspaper information about the cybercrimes. In addition to this the rate of the cybercrimes have been increasing and this has propelled the research about the problem and on obtain an efficient solution of the problem. The solutions would be helpful for the community for safeguarding their data from the ill practitioners. The feasibility issues have been checked very efficiently and also have been identified which are to be addressed significantly (Bender and Orszag 2013). The problems are thought to be feasible enough to raise the concern for the common people and the solution would be safeguarding the privacy of the people. There have been previous experiences about this problems. This type of problems are frequently faced in various business organizations and also in various educational institutes. The main problem that are faced with this are the attendance issues. The attendances could easily be falsified, but the use of the biometrics system would be a useful solution to this problems. The multidisciplinary and the interdisciplinary problems have been very easily identified. The hackers and the mal practitioners target the user do the social media keeping their identity hidden form the common people. This has been very in common in the social websites such as the Facebook and twitter where people can easily create fake profiles and spam others. The current structures of the platforms does not prohibit the illegal activities on their website and do they have proper methodologies to counter the effects. Although they have a facility to recognize the official profiles but this is not the case for all the users and hence, the defect in the system remains. The implementation of this kind of technology would require authentication by the social networking websites. The permissions of the website are very necessary and in addition to this the proper verification from the users are also very necessary and hence, the implementation would not be so easy. Although this kind technology has been implemented earlier in banking and examination sites. There has been consideration made for the alternate techniques for the solution of the problem that is at hand (Paul 2013). However there has been no alternative solutions that have been considered effective for the solution of the problem that is on hand. The different constrains for the implementation of the solution have been considered. Implementation of this techniques require great deal of expertise in the field of biometrics and also in the field of database management and also in the field of website development. There is a requirement of incorporating the biometrics with the database of the websites. The novelty lies in the idea of protecting the privacy of the people and safeguarding very confidential data of the people form the hackers and the mal practitioners (Mayer et al. 2014). In addition to this the problem that is identified is a valid one and also very logical one. This is a general problem and requires an urgent solution if possible. There are existing solutions for the problem (Georgilakis and Hatziargyriou 2015). The techniques that are implemented in the banking and the examination websites. The same techniques can be applied to the social networking website where the candidate to has to provide the website with a digital signature and the signature is verified with the database of the website. Although there has been no exact implementation of the biometrics technique References Bender, C.M. and Orszag, S.A., 2013.Advanced mathematical methods for scientists and engineers Management: Asymptotic methods and perturbation theory. Springer Science Business Media. Georgilakis, P.S. and Hatziargyriou, N.D., 2015. A review of power distribution planning in the modern power systems era: Models, methods and future research.Electric Power Systems Research,121, pp.89-100. Mayer, I., Bekebrede, G., Harteveld, C., Warmelink, H., Zhou, Q., Ruijven, T., Lo, J., Kortmann, R. and Wenzler, I., 2014. The research and evaluation of serious games: Toward a comprehensive methodology.British Journal of Educational Technology,45(3), pp.502-527. Paul, E.A., 2014.Soil microbiology, ecology and biochemistry. Academic press. Robertson, G., Caldwell, G., Hamill, J., Kamen, G. and Whittlesey, S., 2013.Research methods in biomechanics, 2E. Human Kinetics. Schwarz, N., 2014.Cognition and communication: Judgmental biases, research methods, and the logic of conversation Management. Psychology Press. Zikmund, W.G., Babin, B.J., Carr, J.C. and Griffin, M., 2013.Business research methods. Cengage Learning.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.