2022, Volume 11
2021, Volume 10
2020, Volume 9
2019, Volume 8
2018, Volume 7
2017, Volume 6
2016, Volume 5
2015, Volume 4
2014, Volume 3
2013, Volume 2
2012, Volume 1
Department of Mathematics and Computer Science, Lucian Blaga University of Sibiu, Sibiu, Romania
The usage of the VM apps poses a degree of vulnerability to multiple privacy and safety risks. Within this article are presented certain aspects related to the usage of such apps, what to consider when using them during the training procedure and video meetings. The date gathered based of this paper on the analysis of VM applications, the establishment of some common characteristics, their most important and useful characteristics have been highlighted. Videoconference apps have been successfully used within training sessions during the pandemic, without taking into consideration the security, privacy and massage of such technological tools. A survey was conducted on the security and vulnerability aspects of the applications used by the teacher. It was sought the degree of knowledge of these problems. It was seen that the discussions held in video format occupy over 60% of the multimedia methods used in online classes. The exceptional utilization increased utilization of VM apps, it should be noted that cyber security problems connected to such techniques should be given an increased attention. One cannot imagine a teaching-learning procedure without having an online video meeting. As such, in the following chapter, are detailed solutions for teleconferences and the security aspects adherent to such and we conducted on the degree of use of VM applications, the application of security techniques and recommendations for a better application of VM applications.
Education, Video Conferencing, Privacy, Abuse, Security
Biclea Diana. (2022). The Fundamental Use of Videoconferencing in Online Teaching. American Journal of Software Engineering and Applications, 11(2), 31-37. https://doi.org/10.11648/j.ajsea.20221102.12
Copyright © 2022 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. | Ali A. H., George L. E., Mokhtar M. R. An Adaptive High Capacity Model for Secure Audio Communication Based on Fractal Coding and Uniform Coefficient Modulation. Circuits, Syst. Signal Process., vol. 39, no. 10, pp. 5198-5225, 2020. |
2. | Chakraborty P., Mittal P., Gupta M. S., Yadav S., Arora A. Opinion of students on online education during the COVID-19 pandemic, Hum. Behav. Emerg. Technol., vol. 3, no. 3, p. 357-365, 2020. |
3. | Chawla Ajay, Coronavirus (COVID-19). ‘Zoom’ Application Boon or Bane, 2020. 10 p. Available at SSRN: https://ssrn.com/abstract=3606716. |
4. | Costinela - Luminita D. Information security in E-learning Platforms. Procedia - Social and Behavioral Sciences, 15, 2011. |
5. | Diesch R., Pfaff M., Krcmar H. A comprehensive model of information security factors for decision-makers, Comput. Secur., vol. 92, 2020. |
6. | Eck C. J., Dale Layfield K., Dibenedetto C. A., Gore J. School-Based Agricultural Education Teachers Competence of Synchronous Online Instruction Tools During the COVID-19 Pandemic, Journal of Agricultural Education, vol. 62, no. 2, pp. 137-147, 2021. |
7. | Isobe T., Ito R. Security Analysis of End-to-End Encryption for Zoom Meetings, in IEEE Access, vol. 9, pp. 90677-90689, 2021. |
8. | Kagan D., Alpert G. F., Fire M. Zooming Into Video Conferencing Privacy and Security Threats, Cryptography and Security, 2020. |
9. | Karim N. A., Shukur Z. “Review of User Authentication Methods in Online Examination,” Asian J. Inf. Technol., vol. 14, no. 5, 2015, p. 166-175. |
10. | Li C., Lalani F. The COVID-19 pandemic has changed education forever. This is how. World Economic Forum Covid Action Platform, 2020. Available: https://www.weforum.org/agenda/2020/04/coronavirus/education-global-covid19-online-digital-learning/ |
11. | Lynne Coventry. Video Conferencing in Higher Education. https://www.nyu.edu/content/dam/nyu/facultyResources/documents/ESMITS/vc_in_higher_education.pdf |
12. | Mehta, Jay et al. “Rapid implementation of Microsoft Teams in response to COVID-19: one acute healthcare organization’s experience.” BMJ health & care informatics vol. 27, 3 (2020). |
13. | Nader Abdel Karim, Ahmed Hussain Ali. E-learning virtual meeting applications: A comparative study from a cybersecurity perspective. Indonesian Journal of Electrical Engineering and Computer Science Vol. 24, No. 2, 2021, p. 1121-1129. |
14. | Oeppen S., Shaw G., Brennan P. A. Human factors recognition at virtual meetings and video conferencing: how to get the best performance from yourself and others, British Journal of Oral and Maxillofacial Surgery, Volume 58, Issue 6, 2020, p. 643-646. |
15. | Paolo Prinetto and Gianluca Roascio. Hardware Security, Vulnerabilities, and Attacks: A Comprehensive Taxonomy. http://ceur-ws.org/Vol-2597/paper-16.pdf |
16. | Peter Abrahamsson Lindeblad, Yuliya Voytenko, Oksana Mont, Peter Arnfalk. Organizational effects of virtual meetings, Journal of Cleaner Production XXX, 2015, p. 1-11. |
17. | Raan Saeed Al-Maroof, A. Salloum, Aboul Ella Hassanien, Khaled Shaalan. Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic. Interactive Lerning Environments. 2020. |
18. | Ravinder Singh, Soumya Awasthi. Updated Comparative Analysis on Video Conferencing Platforms- Zoom, Google Meet, Microsoft Teams, WebEx Teams and GoToMeetings. EasyChair Preprint nr. 4026, 2020. |
19. | Rubinger L. et. al., Maximizing virtual meetings and conferences: a review of best practices. Int. Orthop., vol. 44, no. 8, pp. 1461-1466, 2020. |
20. | Secara Ion-Alexandru. Zoombombing – the end-to-end fallacy, Network Security VOL. 2020, NO. 8 2021. |
21. | Vanessa Y. Oviedo, Jean E. Fox Tree. Meeting by text or video-chat: Effects on confidence and performance. Computers in Human Behavior Reports. Volume 3, 2021, 100054 p. |
22. | Wlodarczyk, Jordan R. M. D., Wolfswinkel, Erik M. M. D., Carey, Joseph N. M. D. Coronavirus 2019 Video Conferencing: Preserving Resident Education with Online Meeting Platforms. Plastic and Reconstructive Surgery, Volume 146, Number 1, 2020. p. 110-111. |
23. | Yoshiyasu Takefuji. Resilient Secured Education System for Online Lectures During the Pandemic, Journal of Applied Security Research, 2021. |
24. | Zgureanu A. Security aspects of video conferencing services. Culegere de articole ştiinţifice ale Conferinţei Ştiinţific Internaţional “Competitivitate şi Inovare în economia cunoaşterii”, Ediţia a XXII-a, 2, Chişinău, 2020. |
25. | Zoom, “Zoom, Help Center,” 2020. Available: https://support.zoom.us/hc/en-us/articles/201362153-Sharing-your-screen-content-or-second-camera |
26. | Google Support, “Google Meet Security & Privacy for users,” 2020. Available: https://support.google.com/meet/answer/9852160?hl=en#:~:text=All%20data%20in%20Meet%20is,encrypted%20at%20rest%20by%20default |
27. | Microsoft, “Microsoft Docs,” 2020. Available: https://docs.microsoft.com/en-us/welcome-to-docs |
28. | Google Support, “Advanced phishing and malware protection Google Workspace Admin Help,” 2021. Available: https://support.google.com/a/answer/9157861?hl=en |
29. | https://economedia.ro/ins-in-2021-circa-8-din-10-dintre-gospodariile-din-romania-au-acces-la-internet.html |
30. | https://www.unicef.org/moldova/media/3961/file/EVALUARE.html |