1887
Volume 2022, Issue 2
  • EISSN: 2616-4930

Abstract

Previous researchers have failed to situate seemingly important components of contemporary real-life truth in the mainstream of investigations. As new modes of transferring knowledge, accessing, and retrieving information emerge, resources and technology advance, and webinars are becoming one of the easiest and cheapest ways to reach the public, synchronously or asynchronously. Many online meeting tools, regarded as windows to the future of communication and imparting knowledge, are evolving rapidly. However, webinar sites tend to help viewers or listeners register on the websites and even provide favorable conditions to make the audience feel safe. In doing so, others join the webinars with a sole aim of tapping important information from the public, thus making the webinars niches or blossomed trees for cybercriminals. The fact is that what causes the presence of cybercriminals is logically no different from what can reverse it. This study attempts to review the literature that can change the way people view webinars. It aims to develop new ways of thinking about emerging new systems, respond to change, use knowledge to change the way abnormal behavior occurs during webinar series and open unattended ways to expand the spectrum of anomalous detection mechanisms from many perspectives.

Loading

Article metrics loading...

/content/journals/10.5339/jist.2022.11
2022-09-30
2022-10-04
Loading full text...

Full text loading...

/deliver/fulltext/jist/2022/2/jist.2022.11.html?itemId=/content/journals/10.5339/jist.2022.11&mimeType=html&fmt=ahah

References

  1. ACS. Cybersecurity Guide. (2016). Cybersecurity, threats, challenges, opportunities. http://www.slis.kent.edu/∼mzeng/metadata/Gilland.pdf .
    [Google Scholar]
  2. Aggarwal, C.C., & Yu, P.S. (2001) Outlier detection for high dimensional data. Proceedings of the ACM SIGMOD Conference 2001.
  3. Akbulut, Y. (2007). Effects of multimedia annotations on incidental vocabulary learning and reading comprehension of advanced learners of English as a foreign language. Instructional Science, 35:(6), 499–517.
    [Google Scholar]
  4. Austin, L. (2003). Privacy and the question of technology. Law and Philosophy, 22:(2), 119–166.
    [Google Scholar]
  5. Baah, G.A., Gray, A., & Harrold, M.J. (2006). On-line anomaly detection of deployed software: A statistical machine learning approach. https://www.researchgate.net/publication/221388373, https://doi.org/10.1145/1188895.1188911.
    [Google Scholar]
  6. Bada, M., & Nurse, J.R.C. (2020). The social and psychological impact of cyber-attacks. In V.
    [Google Scholar]
  7. Benson, & J. McAlaney (Ed.), Emerging cyber threats and cognitive vulnerabilities. Academic Press.
    [Google Scholar]
  8. Barnett, V., & Lewis, T. (1994).Outliers in statistical data (3rd ed.). John Wiley & Sons.
  9. Besnerais, J.L., Devillers, E., & Toubin, H. (2020).Electromagnetic noise and vibrations in electromagnetic webinar 7/8: Magnetic noise reduction of electrical machines using MANATEE Software. 2020 EOMYS ENGINEERING. www.eomys.com.
  10. Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009). All your contacts are belong to us?: Automated identity theft attacks on social networks. International Conference on World Wide Web, 18:(1), 551–560.
    [Google Scholar]
  11. British Library. (2010).2020 Vision Project: Size, scope and use of British Library collection. Internal Discussion Paper.
  12. Burgoon, J.K., Parrott, R., LePoire, B.A., Kelley, D.L., Walther, J.B., & Perry, D. (1989). Maintaining and restoring privacy through communication in different types of relationship. Journal of Social and Personal Relationships, 6:(2), 131–158.
    [Google Scholar]
  13. Burton, D., & Kitchen, T. (2010). Online videoconferencing products: Update. The International Review of Research in Open and Distance Learning, 12:(2), 157–165.
    [Google Scholar]
  14. Carreño, A., Inza, I., & Lozano, A. (2020). Analyzing rare event, anomaly, novelty, and outlier detection terms under the supervised classification framework. Artificial Intelligence Review, 53:(1), 3575–3594. https://doi.org/10.1007/s10462-019-09771-y.
    [Google Scholar]
  15. Choo, C.W. (2001). Environmental scanning as information seeking and organizational learning. Information Research, 7:(1), 1–25.
    [Google Scholar]
  16. Company Webcast (n.d.). What is a webinar? https://www.webinar.nl/en/webinars/what-is-a-webinar/ .
    [Google Scholar]
  17. Cornelius, S. (2014). Facilitating in a demanding environment: experiences of teaching in virtual classrooms using web conferencing. British Journal of Educational Technology, 45:, 260–271.
    [Google Scholar]
  18. Culcasi, I., & Cinque, M. (2020).Online meeting toolkit: How to create effective online events. http://cimea.it/webinar/ONLINEMEETINGTOOLKIT_singole.pdf.
    [Google Scholar]
  19. DeCew, J. (1997).In pursuit of privacy: Law, ethics, and the rise of technology. Cornell University Press, Ithaca.
    [Google Scholar]
  20. Department for Digital, Culture, Media and Sport (2020). Cyber security breaches survey 2020: Statistical release.
    [Google Scholar]
  21. Dervin, B. (1998). Sense-making theory and practice: An overview of user interests in knowledge seeking and use. Journal of Knowledge Management, 2:(2), 36–46.
    [Google Scholar]
  22. Dietterich, T., Fern, A., Wong, W.K., Battacharyya, S., Mondal, D., Emott, A., Das, S.,.
  23. Garrepalli, R., Juozapaitis, Z., Liu, S., Siddiqui, M.A., & Zemicheal, T. (2018).Anomaly detection: Algorithm, explanation, and applications. https://www.youtube.com/watch?v = 12Xq9OLdQwQ .
    [Google Scholar]
  24. Dijle, H. (2006).Türkiye'de eğitimli insanların bilişim suçlarına yaklaşımı. Yayınlanmamış Yüksek Lisans Tezi, Gazi Üniversitesi Fen Bilimleri Enstitüsü.
  25. Dousay, T.A. (2016). Effects of redundancy and modality on the situational interest of adult learners in multimedia learning. Educational Technology Research and Development, 64:(6), 1251–1271.
    [Google Scholar]
  26. Ebner, C., & Gegenfurtner, A. (2019). Learning and satisfaction in webinar, online, and face-to-face instruction: A meta-analysis. Frontiers in Education, 4:(92), 1–11. https://doi.org/10.3389/feduc.2019.00092.
    [Google Scholar]
  27. Farley, T. (2015). Introduction. In M. Rosenquist (Ed.) Navigating the digital age: The definitive cybersecurity guide for directors and officers. Caxton: Business & Legal Incorporation.
    [Google Scholar]
  28. Ferguson, R. (2010). Peer interaction: The experience of distance students at a university level. Journal of Computer Assisted Learning, 26:(6), 574–584.
    [Google Scholar]
  29. Gegenfurtnera, A., & Ebner, C. (2019). Webinars in higher education and professional training: A meta-analysis and systematic review of randomized controlled trials. Educational Research Review, 28:(100293). https://doi.org/10.1016/j.edurev.2019.100293.
    [Google Scholar]
  30. GoToWebinar. (2017).The 2017 Big Book Of Webinar Stats: The marketer's source for webinar trends, stats and best practices. https://assets.cdngetgo.com/e7/73/cbeb606b4f9295747b31e0442f24/gotowebinar-2017-big-book-of-webinar-stats.pdf.
  31. He, S., Zhu, J., He, P., & Lyu, M.R. (2016). Experience report: System log analysis for anomaly detection. 2016 IEEE 27th International Symposium on Software Reliability Engineering. https://doi.org/10.1109/ISSRE.2016.21.
    [Google Scholar]
  32. Heikkilä, J. (2018).Benefits of audiovisual memory encoding across the life span. Department of Psychology and Logopedics, Faculty of Medicine University of Helsinki, Finland.
  33. Hetcher, S.A. (2002).Cyberian signals. 36, U. Rich. L. Rev. 327. http://scholarship.richmond.edu/lawreview/vol36/iss2/2 .
  34. Hjørland, B. (2009). The foundation of the concept of relevance. Journal of the American Society for Information Science and Technology, 61:(2), 217–237. https://doi.org/10.1002/asi.21261.
    [Google Scholar]
  35. Hodge, V.J., & Austin, J. (2004). A survey of outlier detection methodologies. Artificial Intelligence Review, 22:(2), 85–126..
    [Google Scholar]
  36. Hrastinski, S.A. (2009). A theory of online learning as online participation. Computers & Education, 52:(1), 78–82.
    [Google Scholar]
  37. Huss, N. (2022).How many websites are there in the world? https://siteefy.com/how-many-websites-are-there/#How-Many-Websites-Are-There .
    [Google Scholar]
  38. John, G.H. (1995). Robust decision trees: Removing outliers from databases. Proceedings of the First International Conference on Knowledge Discovery and Data Mining. Menlo Park, CA, pp. 174–179, AAAI Press.
    [Google Scholar]
  39. Johnson, C.L., & Schumacher, J.B. (2016). Does webinar – based financial education affect knowledge and behavior? Journal of Extension, 54:(1). https://tigerprints.clemson.edu/joe/vol54/iss1/19.
    [Google Scholar]
  40. Library Journal. (2014).Survey of e-book usage in U.S. public libraries(5th Annual Survey). chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://s3.amazonaws.com/WebVault/ebooks/LJSLJ_EbookUsage_PublicLibraries_2014.pdf .
  41. Lynch, J. (2005). Identity theft in cyberspace: Crime control methods and their effectiveness in combating phishing attacks. Berkeley Technology Law Journal, 20:(259), 259–300.
    [Google Scholar]
  42. Maharjan, N. (2020).Web-based anomaly detection using machine learning. https://www.researchgate.net/publication/354555312 .
  43. Mayor, R.E. (1990). Multimedia instruction. In J. Spector, M. Merrill, J. Elen, & M. Bishop (Eds), Handbook of research on educational communications and technology. New York, NY, USA: Springer.
    [Google Scholar]
  44. Mayor, R.E., & Anderson, R.B. (1992). The instructive animation: Helping students build connections between words and pictures in multimedia learning. Journal of Educational Psychology, 84:(4), 444–452.
    [Google Scholar]
  45. Mayor, R.E., & Gallini, J.K. (1990). When is an illustration worth ten thousand words? Journal of Educational Psychology, 82:(4), 715–726.
    [Google Scholar]
  46. McAfee. (2018).The economic impact of cybercrime—no slowing down. https://www.mcafee.com/enterprise/en-us/solutions/lp/economics-cybercrime.html .
  47. Mussaui-Ulyanishcheva, E.V., & Zakharova, E.V. (2020). Impact of student participation in webinars on increasing motivation to learn. Universal Journal of Educational Research, 8:(12), 6953–6959. https://doi.org/10.13189/ujer.2020.081262.
    [Google Scholar]
  48. Nahl, D. (2005). Affective load. In K.E. Fisher, S. Erdelez, & L.E.F. McKechnie (Eds).Theories of information behaviour. American Society for Information Science and Technology.
    [Google Scholar]
  49. Ogutcu, G., Cirakoglu, O.C., & Cula, S. (2016). Information security in the world of digital natives: How internet addiction, sensation seeking and information security behaviours are related. International Journal of Management and Applied Science, 2:(9), 79–84.
    [Google Scholar]
  50. Paine, C., Reips, U.D., Stieger, S., Joinson, A., & Buchanan, T. (2007). Internet users’ perception of privacy concerns and privacy actions. International Journal of Human-Computer Studies, 65:(6), 526–536.
    [Google Scholar]
  51. Pearson, H.C., & Wilbiks, J.M.P. (2021). Effects of audiovisual memory cues on working memory recall. Vision, 5:(14), 1–10. https://doi.org/10.3390/vision5010014 .
    [Google Scholar]
  52. Polanco-Bueno, R. (2013). Blogs, webinars and significant learning: A case report on a teacher-training program for college teachers. Higher Learning Research Communications, 3:(1), 56–67. http://dx.doi.org/10.18870/hlrc.v3i1.72 .
    [Google Scholar]
  53. Polanco, R., & Merino, I.L. (2011, March). Blog and Webinar as distance significant Learning building tools: A global learning experience for higher education professors. Paper presented at the 6 th International Technology, Education and Development Online Conference.
    [Google Scholar]
  54. Prenksy, M. (2001). Digital natives, digital immigrants. On the Horizon, 9:(5). http://www.marcprensky.com/writing/Prensky%20%20Digital%20Natives,%20Digital%20immigrants%20-%20Part1.pdf .
    [Google Scholar]
  55. Prince, M. (2004). Does active learning work? Journal of Engineering Education, 93:(3), 223–231. http://dx.doi.org/10.1002/j.2168-9830.2004.tb00809.x .
    [Google Scholar]
  56. Raytheon, Forcepoint and the National Cyber Security Alliance (2017). Securing our future: Cybersecurity and the millennial workforce. A study commissioned by Raytheon, Forcepoint and the National Cyber Security Alliance about security practices in the new workforce and preparedness for cybersecurity careers among young adults in nine countries. https://www.raytheon.com/sites/default/files/2017-12/2017_cyber_report_rev1.pdf .
  57. Rousseeuw, P., & Leroy, A. (1996).Robust regression, and outlier detection (3rd ed.). John Wiley & Sons.
  58. Scheiderer, J. (n.d.).What's the difference between asynchronous and synchronous learning? Ohio State Inline. https://online.osu.edu/resources/learn/whats-difference-between-asynchronous-and-synchronous-learning .
  59. Shrivastava, A. (2020). Identity theft in cyberspace with special reference to India. Pen Acclaims, 8, 1–5. www.penacclaims.com .
    [Google Scholar]
  60. Solove, D.J. (2004).The digital person. Technology and privacy in the information age. New York: NYU Press.
  61. Soroya, S.H., & Ameen, K. (2020). Subject-based reading behaviour differences of young adults under emerging digital paradigm. Libri: International Journal of Libraries & Information Services, 70:(2), 2–11.
    [Google Scholar]
  62. Statista. (2018a).eBooks: United States. https://www.statista.com/outlook/213/109/ebooks/unitedstates.
  63. Statista. (2018b).Forecast of epublishing revenue by Segment Worldwide from 2017 to 2023 (In Million U.S. Dollar). Retrieved March 20, 2020, from https://www.statista.com/statistics/456813/dig ital-publishing-revenue-format-digitalmarket-outlook-worldwide/.
  64. Sura, K., Lischalk, J.W., Leckie, J., Welsh, J.S., & Fernandez, E. (2017). Webinar-based contouring education for residents. Journal of the American College of Radiology, 14:(8), 1074–1079.
    [Google Scholar]
  65. Symantec Corporation. (2019).ISTR: Internet Security Threat Report. Symantec Corporation. https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf.
  66. Tindall-Ford, S., Chandler, P., & Sweller, J. (1997). When two sensory modalities are better than one. J. Exp. Psychol., 3:(4), 257–287.
    [Google Scholar]
  67. Velayo, R.S. (1993).Retention of visual and verbal content and perceived self-competence in audiovisual instruction. https://www.researchgate.net/publication/323858956_Retention_of_visual_and_verbal_content_and_perceived_self-competence_in_audiovisual_instruction .
  68. Warren, S., & Brandeis, L.D. (1890).The right to privacy. Harvard Law Review, 5. http://www.lawrence.edu/fast/boardmaw/Privacy_brand_warr2.html.
  69. Webinar Software (2022). Detailed webinar guides and expert advice. 80+ Practical webinar statistics – Optimize for success in 2022. https://www.webinarsoftware.org/webinar-statistics/.
    [Google Scholar]
  70. Westin, A. (1967).Privacy and freedom. New York: Atheneum.
  71. Wu, T.H. (2017).Network anomaly detection. Report. Hong Kong: Department of Computer Science, The University of Hong Kong.
http://instance.metastore.ingenta.com/content/journals/10.5339/jist.2022.11
Loading
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error