16,081 research outputs found
Pendekatan konstruktif dalam inovasi pengajaran dan pembelajaran Bahasa Melayu di Kolej Vokasional
Pendekatan konstruktif adalah pendekatan pengajaran dan pembelajaran yang
berpusatkan pelajar manakala inovasi pengajaran pula dikaitkan dengan kaedah
pengajaran yang terbaru demi mengukuhkan pemahaman pelajar. Pembelajaran
berasaskan pendekatan konstruktif merupakan elemen yang penting dan perlu
difahami oleh guru-guru bagi memantapkan proses pengajaran dan pembelajaran
sesuai dengan peredaran masa dan menjayakan proses tranformasi pendidikan
negara. Objektif kajian ini dijalankan untuk mengenal pasti pemahaman guru-guru
bahasa Melayu berkaitan inovasi, mengenal pasti perbezaan yang wujud antara guru
lelaki dan guru perempuan dalam mengamalkan inovasi, pengkaji juga melihat
adakah wujud perbezaan antara guru baru dan guru yang sudah berpengalaman
dalam aspek mengaplikasikan inovasi serta mengenal pasti kekangan-kekangan yang
dialami oleh para guru untuk mengaplikasikan inovasi di sekolah. Seramai 63 orang
guru bahasa Melayu dari lapan buah kolej vokasional telah dipilih sebagai responden
dalam kajian ini. Data dianalisis menggunakan perisian Winsteps 3.69.1.11 dengan
pendekatan Model Pengukuran Rasch. Hasil analisis menunjukkan bahawa guru�guru bahasa Melayu memahami kepentingan inovasi dalam pengajaran dan
pembelajaran. Hasil kajian juga menunjukkan guru-guru perempuan lebih banyak
menerapkan unsur inovasi dalam pengajaran berbanding guru lelaki. Walaupun
begitu, aspek pengalaman tidak menunjukkan perbezaan dari segi pengamalan
inovasi sama ada guru baru ataupun guru yang sudah berpengalaman. Pengkaji juga
mengenal pasti beberapa kekangan yang dialami oleh guru-guru untuk mengamalkan
inovasi ini. Sebagai langkah untuk menangani masalah berkenaan, beberapa
cadangan telah dikemukakan oleh pengkaji bagi memastikan guru-guru dapat
merealisasikan proses pengajaran berkesan dengan penerapan inovasi mengikut
model pendekatan konstruktif. Pengkaji berharap, kajian ini dapat dijadikan sebagai
satu panduan kepada pelaksana kurikulum bagi memastikan budaya inovasi sentiasa
menjadi amalan dalam kalangan guru demi mengangkat profesionalisme guru di
Malaysia
Body language, security and e-commerce
Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations
How Smart is your Android Smartphone?
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt data stored on the external media card. While smartphones remain vulnerable to a variety of security threats, this encryption provides an additional level of security
Keep Your Nice Friends Close, but Your Rich Friends Closer -- Computation Offloading Using NFC
The increasing complexity of smartphone applications and services necessitate
high battery consumption but the growth of smartphones' battery capacity is not
keeping pace with these increasing power demands. To overcome this problem,
researchers gave birth to the Mobile Cloud Computing (MCC) research area. In
this paper we advance on previous ideas, by proposing and implementing the
first known Near Field Communication (NFC)-based computation offloading
framework. This research is motivated by the advantages of NFC's short distance
communication, with its better security, and its low battery consumption. We
design a new NFC communication protocol that overcomes the limitations of the
default protocol; removing the need for constant user interaction, the one-way
communication restraint, and the limit on low data size transfer. We present
experimental results of the energy consumption and the time duration of two
computationally intensive representative applications: (i) RSA key generation
and encryption, and (ii) gaming/puzzles. We show that when the helper device is
more powerful than the device offloading the computations, the execution time
of the tasks is reduced. Finally, we show that devices that offload application
parts considerably reduce their energy consumption due to the low-power NFC
interface and the benefits of offloading.Comment: 9 pages, 4 tables, 13 figure
Heartland Payment Systems: lessons learned from a data breach
On August 13, 2009, the Payment Cards Center hosted a workshop examining the changing nature of data security in consumer electronic payments. The center invited the chairman and CEO of Heartland Payment Systems (HPS or Heartland), Robert (Bob) Carr, to lead this discussion and to share his experiences stemming from the data breach at his company in late 2008 and, as important, to discuss lessons learned as a result of this event. The former director of the Payment Cards Center, Peter Burns, who is acting as a senior payments advisor to HPS, also joined the discussion to outline Heartland's post-breach efforts aimed at improving information sharing and data security within the consumer payments industry. In conclusion, Carr introduced several technology solutions that are under discussion in payment security circles as ways to better secure payment card data as they move among the different parties in the card payment systems: end-to-end encryption, tokenization, and chip technology. While HPS has been very supportive of end-to-end encryption, each of these alternatives offers its own set of advantages and disadvantages.Payment systems ; Data protection ; Electronic commerce
- …