Your Name Here

Total Page:16

File Type:pdf, Size:1020Kb

Your Name Here MEANINGFUL ONLINE LEARNING: EXPLORING INTERACTION IN A WEB-BASED LEARNING ENVIRONMENT USING AUTHENTIC TASKS by YOUNGHEE WOO (Under the Direction of Thomas C. Reeves) ABSTRACT This study explored a Web-based learning case which was designed using authentic tasks and based on social constructivism to provide a deeper understanding of meaningful interaction through the lens of social constructivism. The case was a master’s level course offered online by a university in Australia and the participants in this study consisted of the students and instructor in the course. First, the study examined how the students interacted to accomplish the authentic task in the WBLE. The analysis of the transcripts of the online discussion forum, chat room, and interviews yielded a detailed picture of the interaction occurring in a WBLE structured around authentic tasks. Through the analysis, three major categories with multiple themes were identified: the nature of online interaction (i.e., means to an ends, authenticity, and scaffolding), the process of the interaction (i.e., getting into task, defining, accomplishing, and reflecting), and strategies for improving the quality of the interaction (i.e., designing incrementally more challenging tasks, and providing active facilitation). Second, the study explored what meaningful experiences the students had that supported their learning. Through the interview, which was conducted for better understanding students’ perspectives about the whole experience of being in a WBLE using authentic tasks, students were encouraged to reflect on their experiences in the course. The analysis of the interview transcripts yielded a category called the Learning Effect. Three themes emerged related to the main learning effects in the WBLE using authentic tasks: high motivation, opportunities for reflection, and meaningful experiences. The identification process described what meaningful interaction looks like in a WBLE and clearly showed using authentic tasks in a WBLE led to meaningful interaction that directly influenced students’ learning growth. INDEX WORDS: online learning, interaction, meaningful interaction, social constructivism, authentic task, web-based learning MEANINGFUL ONLINE LEARNING: EXPLORING INTERACTION IN A WEB-BASED LEARNING ENVIRONMENT USING AUTHENTIC TASKS by YOUNGHEE WOO BA, Ewha Womans University, 1996, Republic of Korea MA, Ewha Womans University, 1998, Republic of Korea A Dissertation Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY ATHENS, GEORGIA 2006 © 2006 Younghee Woo All Rights Reserved MEANINGFUL ONLINE LEARNING: EXPLORING INTERACTION IN A WEB-BASED LEARNING ENVIRONMENT USING AUTHENTIC TASKS by YOUNGHEE WOO Major Professor: Thomas C. Reeves Committee: Michael J. Hannafin Janette R. Hill Mary Ann Fitzgerald Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2006 iv DEDICATION This dissertation is dedicated to my parents who made all of this possible for their endless love and encouragement. v ACKNOWLEDGEMENTS The writing of a dissertation can be a lonely and isolating experience, but it is obviously not possible without the personal and practical support of numerous people. I extend special thanks to my admirable advisor Prof. Thomas C. Reeves, for his countless hours of reflecting, reading, encouraging, and most of all patience throughout the entire process. I am grateful for his time and effort. My other committee members, Dr. Michael J. Hannafin, Dr. Janette R. Hill, and Dr. Mary Ann Fitzgerald, all gave their time and effort to help me produce this dissertation. Their efforts and support are greatly appreciated. I would like to acknowledge and thank Dr. Jan Herrington and Dr. Shirley Agostinho, faculty at the University of Wollongong in Australia, for allowing me to conduct my research in their classes and for providing any assistance requested. Their help allowed me to give my research a truly global scale, broadening and deepening my understanding of the online learning community. My thanks must go also to Dr. Jung Sun Hahn, who is a professor of EWHA Womans University. She has consistently helped me keep perspective on what is important in life and given me encouragement and emotional support in whatever I have pursued since our first meeting in 1994. Above all, I would like to thank my parents and two brothers whose unconditional love and understanding have kept me going over the past four years. I owe special thanks to my husband, Jaesuk, who has expressed an unwavering belief in my ability to succeed. In closing, I thank God. For only through God's grace and blessings has this pursuit been possible. vi TABLE OF CONTENTS Page ACKNOWLEDGEMENTS.............................................................................................................v LIST OF TABLES...........................................................................................................................x LIST OF FIGURES ....................................................................................................................... xi CHAPTER 1 INTRODUCTION AND LITERATURE REVIEW .....................................................1 Introduction ...............................................................................................................2 Chapter Overviews....................................................................................................4 References .................................................................................................................7 2 MEANINGFUL INTERACTION IN WEB-BASED LEARNING: A SOCIAL CONSTRUCTIVIST INTERPRETATION ................................................................10 Abstract ...................................................................................................................11 Introduction .............................................................................................................12 Defining Online Interaction.....................................................................................13 The Meaning of Meaningful....................................................................................14 Rethinking Interaction from a Social Constructivist Perspective ...........................19 Recognizing Meaningfulness in Online Interactions ..............................................26 Conclusion...............................................................................................................28 References ...............................................................................................................29 vii 3 INTERACTION IN ASYNCHRONOUS WEB-BASED LEARNING ENVRIONMENTS: STRATEGIES SUPPORTED WITH EDUCATIONAL RESEARCH ...........................................................................................................42 Abstract ...................................................................................................................43 Introduction .............................................................................................................44 Asynchronous Web-based Learning Environments................................................44 Meaningful Interaction............................................................................................46 The Characteristics of Asynchronous Meaningful Interaction................................48 How to Promote Meaningful Interaction.................................................................50 Discussion ...............................................................................................................60 Conclusion...............................................................................................................61 References ...............................................................................................................62 4 MEANINGFUL ONLINE LEARNING: EXPLORING INTERACTION IN A WEB-BASED LEARNING ENVIRONMENT USING AUTHENTIC TASKS (CASE STUDY) ........................................................................................75 Abstract ...................................................................................................................76 Introduction .............................................................................................................77 Literature Review....................................................................................................78 Methodology ...........................................................................................................82 Findings...................................................................................................................93 Discussion .............................................................................................................117 Limitations and Future Research...........................................................................123 Conclusion.............................................................................................................125 viii References .............................................................................................................126 5 GUIDELINES FOR IMPLEMENTING AUTHENTIC TASKS TO INCREASE MEANINGFUL INTERACTION IN WEB-BASED LEARNING ENVIRONMENTS ..............................................................................................140 Abstract .................................................................................................................141
Recommended publications
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • Msn 9 Offline Installer
    Msn 9 offline installer click here to download Since the link to install the windows live essentials version has officially dropped from Microsoft Windows Live Essentials () ENG Offline Installer Link alexisnik UTC #9. Internet Explorer 9 is the recommended browser for Windows Vista. Now with Bing and MSN defaults for an improved web experience. Microsoft does not provide any link to download full offline installer of Windows Live Messenger , instead you will find the integrated live. MSN Messenger 9 Offline Installer. Live Messenger Microsoft does not provide any link to download full offline installer of Windows Live. Install MSN software. To download and install MSN software, click Install Now. Install System requirements and recommendations. Minimum. Microsoft®. Follow the instructions to order and install from a CD here. 9. Click Next to complete installation. Once the installation has completed the install wizard will. MSN Windows Live Messenger Full Offline Installer. calculo70 MSN e offline Links Windows XP SP3 Pt Br Original IE 8 MSN 9 a Istalador. msn ie8 windows 7 full installer Download Link . 9/14/ · To download the offline installer for Internet Explorer 11, choose your language and system below. Windows Live Messenger (formerly MSN Messenger) is a software, Using Microsoft, MSN, MSN Windows Live, offline installer, offline setup, Send Sms For. Smash • 9 months ago. Thank you for the offline installer. Well just installed, i choose only to download MSN Messenger, but it said that i had. Yahoo messenger 9 final full offline installer You can add and check status of your MSN Live messenger contacts in Yahoo messenger.
    [Show full text]
  • Instant Messaging Video Converter, Iphone Converter Application
    Web Browsing Mozilla Firefox The premier free, open-source browser. Tabs, pop-up blocking, themes, and extensions. Considered by many to be the world's best browser. Download Page Video Player, Torrents, Podcasting Miro Beautiful interface. Plays any video type (much more than quicktime). Subscribe to video RSS, download, and watch all in one. Torrent support. Search and download from YouTube and others. Download Page IM - Instant Messaging Adium Connect to multiple IM accounts simultaneously in a single app, including: AOL IM, MSN, and Jabber. Beautiful, themable interface. Download Page Video Converter, iPhone Converter Miro Video Converter Convert any type of video to mp4 or theora. Convert any video for use with iPhone, iPod, Android, etc. Very clean, easy to use interface. Download Page Application Launching Quicksilver Quicksilver lets you start applications (and do just about everything) with a few quick taps of your fingers. Warning: start using Quicksilver and you won't be able to imagine using a Mac without it. Download Page Email Mozilla Thunderbird Powerful spam filtering, solid interface, and all the features you need. Download Page Utilities The Unarchiver Uncompress RAR, 7zip, tar, and bz2 files on your Mac. Many new Mac users will be puzzled the first time they download a RAR file. Do them a favor and download UnRarX for them! Download Page DVD Ripping Handbrake DVD ripper and MPEG-4 / H.264 encoding. Very simple to use. Download Page RSS Vienna Very nice, native RSS client. Download Page RSSOwl Solid cross-platform RSS client. Download Page Peer-to-Peer Filesharing Cabos A simple, easy to use filesharing program.
    [Show full text]
  • Windows Live
    Microsoft Your potential. Our passion,"' Windows Live MICROSOFT ONLINE SERVICES •Lsw-EMerccmcnt Use Onty- Law Enforcement Hotline: (425) 722-1299 MSN & windows Live Services: Hotmail & Passport Requests: FAX: (425) 727-3490 FAX: (650) 693-7061 Microsoft Corporation Microsoft Corporation Attention: Attention: Online Services Custodian of Records online Services custodian of Records One Microsoft Way 1065 la Avenida, Building 4 Redmond, WA 98052-6399 Mountain View, CA 94043 Summary of Record Retention Policies Hotmail & MSN E-mail IP Logs 60 days + initial sign in MSN internet Access Connection Logs 60 da\s MSN Groups—US (IP) Logs 60 days MSN Groups — inactive Status 30 days of non-activity MSN Groups — Content Deletion 30 days (!>i)5!~iu:«:iiv[- or ilbaDk'U) MSN Spaces — IIS (IP) Logs 60 days MSN Spaces — Content Deletion 90 days (after ifis;il>leil) Windows Live Messenger Conversations None Passport Varies depending on connection and date range EMERGENCY REQUESTS Microsoft online Services will respond to emergency requests outside of normal business hours if the emergency involves "the immediate danger of death or physical injury to any person..." as defined in 18 u.S.C. § 2702(c)(4) and (b)(8). Emergencies are limited to situations like kidnapping, murder threats, bomb threats, terrorist threats, etc. Legal Documentation Required for Customer Account information and content The Electronic communications Privacy Act (ECPAi (18 u.S.c. § 2701 through 2712) governs what legal documentation is required in order for Microsoft's online services records custodians to disclose customer account information and e-mail content. For most Microsoft Online services: Basic Subscriber information may be Disclosed with a Subpoena.
    [Show full text]
  • Unpermitted Resources
    Process Check and Unpermitted Resources Common and Important Virtual Machines Parallels VMware VirtualBox CVMCompiler Windows Virtual PC Other Python Citrix Screen/File Sharing/Saving .exe File Name VNC, VPN, RFS, P2P and SSH Virtual Drives ● Dropbox.exe ● Dropbox ● OneDrive.exe ● OneDrive ● <name>.exe ● Google Drive ● etc. ● iCloud ● etc. Evernote / One Note ● Evernote_---.exe ● onenote.exe Go To Meeting ● gotomeeting launcher.exe / gotomeeting.exe TeamViewer ● TeamViewer.exe Chrome Remote ● remoting_host.exe www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ Messaging / Video (IM, IRC) / .exe File Name Audio Bonjour Google Hangouts (chrome.exe - shown as a tab) (Screen Sharing) Skype SkypeC2CPNRSvc.exe Music Streaming ● Spotify.exe (Spotify, Pandora, etc.) ● PandoraService.exe Steam Steam.exe ALL Processes Screen / File Sharing / Messaging / Video (IM, Virtual Machines (VM) Other Saving IRC) / Audio Virtual Box Splashtop Bonjour ● iChat ● iTunes ● iPhoto ● TiVo ● SubEthaEdit ● Contactizer, ● Things ● OmniFocuse phpVirtualBox TeamViewer MobileMe Parallels Sticky Notes Team Speak VMware One Note Ventrilo Windows Virtual PC Dropbox Sandboxd QEM (Linux only) Chrome Remote iStumbler HYPERBOX SkyDrive MSN Chat Boot Camp (dual boot) OneDrive Blackboard Chat CVMCompiler Google Drive Yahoo Messenger Office (Word, Excel, Skype etc.) www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ 2X Software Notepad Steam AerooAdmin Paint Origin AetherPal Go To Meeting Spotify Ammyy Admin Jing Facebook Messenger AnyDesk
    [Show full text]
  • Product Guide Revision A
    Product Guide Revision A McAfee Data Loss Prevention 9.3.1 For use with ePolicy Orchestrator 4.5, 4.6, 5.0 Software COPYRIGHT Copyright © 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, Foundscore, Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
    [Show full text]
  • Mining Criminal Networks from Chat Log
    2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology This is the preprint version. See IEEE for the final official version. Mining Criminal Networks from Chat Log Farkhund Iqbal Benjamin C. M. Fung Mourad Debbabi College of Information Technology CIISE CIISE Zayed University Concordia University Concordia University Abu Dhabi, United Arab Emirates Montreal, Canada H3G 1M8 Montreal, Canada H3G 1M8 Email: [email protected] Email: [email protected] Email: [email protected] Abstract—Cybercriminals exploit opportunities for anonymity and masquerade in web-based communication to conduct illegal activities such as phishing, spamming, cyber predation, cyber threatening, blackmail, and drug trafficking. One way to fight cybercrime is to collect digital evidence from online documents and to prosecute cybercriminals in the court of law. In this paper, we propose a unified framework using data mining and natural language processing techniques to analyze online messages for the purpose of crime investigation. Our framework takes the chat log from a confiscated computer as input, extracts the social networks from the log, summarizes chat conversations into topics, identifies the information relevant to crime investigation, and visualizes the knowledge for an investigator. To ensure that the implemented framework meets the needs of law enforcement officers in real-life investigation, we closely collaborate with the cybercrime unit of a law enforcement agency in Canada. Both the feedback from the law enforcement officers and experimental results suggest that the proposed chat log mining framework is effective for crime Fig. 1. Framework overview investigation. Index Terms—crime investigation; criminal networks; data level information, such as IPs, protocols, and path traveled mining; frequent patterns; topic mining.
    [Show full text]
  • Débuter Avec Miranda IM
    Débuter avec Miranda IM TUTORIEL RÉALISÉ PAR DRUSS Présentation Miranda est un client de messagerie instantanée multi-protocoles, gratuit, open-source, léger, portable, personnalisable et esthétique. Il est une alternative à MSN (WLM) qui est un programme propriétaire de Microsoft, et dont certaines fonctionnalités laissent à désirer. Miranda vous permettra non seulement d'utiliser le protocole MSN, mais aussi IRC, AIM, Gtalk, ICQ, Yahoo Messenger, et bien d'autres. Cependant, il est relativement difficile pour un nouvel utilisateur de s'y retrouver dans la multitude d'options que ce programme propose. Ce tutoriel a donc pour but de vous faire découvrir Miranda et de vous guider dans vos premières utilisations, afin que le logiciel soit convivial et adapté à vos besoins. Miranda ne fonctionne actuellement que pour Windows, de 95 à Vista. Des projets pour le porter sous Linux sont en cours, mais pour l'instant, il vous faudra utiliser Wine. Avantages Je liste ci dessous les avantages de Miranda, du moins par rapport à MSN : – multi-protocoles – libre et gratuit – sans publicité – personnalisable, skinnable... esthétique – possibilité de renommer les contacts – possibilité de créer des sous-groupes – discussions par onglets (ou fenêtres, c'est au choix) – des centaines de plugins Sites et IRC Site Français : http://www.miranda-fr.net/ Page de téléchargements : http://www.miranda-fr.net/telechargements/ Le forum français : http://forum.miranda-fr.net/ Officiel, anglais : http://miranda-im.org/ Les addons : http://addons.miranda-im.org/ Liste des tutoriels français : http://forum.miranda-fr.net/tutoriaux-vf14.html Autre tutoriel pour les premiers pas sous Miranda : http://www.miranda-fr.net/faqs/premiers_pas,_installation_et_configuration..html IRC : #miranda-fr et #miranda sur le serveur FreeNode.
    [Show full text]
  • Linux Journal
    Open Science Travel Laptop Auto-Download Means Open Source Tips Linux Journal Since 1994: The original magazine of the Linux community PHOTOGRAPHY AND FOSS +DEEP DIVE: High Performance Computing ISSUE 293 | DECEMBER 2018 www.linuxjournal.com DECEMBER 2018 CONTENTS ISSUE 293 78 DEEP DIVE: High-Performance Computing 79 Linux and Supercomputers by Bryan Lunduke As we sit here, in the year Two Thousand and Eighteen (better known as “the future, where the robots live”), our beloved Linux is the undisputed king of supercomputing. Of the top 500 supercomputers in the world, approximately zero of them don’t run Linux (give or take...zero). 90 Data in a Flash, Part I: the Evolution of Disk Storage and an Introduction to NVMe by Petros Koutoupis NVMe drives have paved the way for computing at stellar speeds, but the technology didn’t suddenly appear overnight. It was through an evolutionary process that we now rely on the very performant SSD for our primary storage tier. 106 Data in a Flash, Part II: Using NVMe Drives and Creating an NVMe over Fabrics Network by Petros Koutoupis By design, NVMe drives are intended to provide local access to the machines they are plugged in to; however, the NVMe over Fabric specification seeks to address this very limitation by enabling remote network access to that same device. 2 | December 2018 | http://www.linuxjournal.com CONTENTS 6 The High-Performance Computing Issue by Bryan Lunduke 10 From the Editor—Doc Searls How Can We Bring FOSS to the Virtual World? 16 Letters UPFRONT 24 Auto-Download Linux Journal Each Month by Mitch Frazier 29 FOSS Project Spotlight: Appaserver by Tim Riley 35 Patreon and Linux Journal 36 Using Linux for Logic by Joey Bernard 44 Lessons in Vendor Lock-in: Messaging by Kyle Rankin 49 Reality 2.0: a Linux Journal Podcast 50 News Briefs COLUMNS 52 Kyle Rankin’s Hack and / Travel Laptop Tips in Practice 56 Reuven M.
    [Show full text]
  • Sample Chapter
    5674ch01.qxd_jt 9/24/03 8:44 AM Page 1 11 TheThe OnlineOnline WorldWorld 5674ch01.qxd_jt 9/24/03 8:44 AM Page 2 Today’s online world has changed dramatically in the last decade. Back then, online to the average user meant a telephone connection directly to either another computer or to an online service, such as CompuServe or AOL. The Internet now dominates all online activity. In popular parlance, the Internet is synonymous with the World Wide Web, although it is much more, as we’ll explain in this book. The Internet can be described generally as a “network” of networks. It is a transportation vehicle for applications. In fact, the visual representations of the Net look like a road map. If lines are drawn between each connection, between larger and larger connections, and between smaller and smaller ones, the end result is a web of connections—a virtual road map. This book is divided into four rough sections. The first is for beginners. It is to get anyone up to speed quickly with the information needed about the Web. Each chapter has recommended Web sites (to type the address, or Uniform Resource Locator [URL] into your Web browser) to help direct you. The second section has more detailed information about downloads, email, secu- rity, and information on virus protection. The third part is about how to create a Web site, Web tools, blogging, and what you can add to your Web site (such as streaming media, RSS feeds, and XML, among other things). The fourth part is by far the densest.
    [Show full text]
  • HTTP: IIS "Propfind" Rem HTTP:IIS:PROPFIND Minor Medium
    HTTP: IIS "propfind"HTTP:IIS:PROPFIND RemoteMinor DoS medium CVE-2003-0226 7735 HTTP: IkonboardHTTP:CGI:IKONBOARD-BADCOOKIE IllegalMinor Cookie Languagemedium 7361 HTTP: WindowsHTTP:IIS:NSIISLOG-OF Media CriticalServices NSIISlog.DLLcritical BufferCVE-2003-0349 Overflow 8035 MS-RPC: DCOMMS-RPC:DCOM:EXPLOIT ExploitCritical critical CVE-2003-0352 8205 HTTP: WinHelp32.exeHTTP:STC:WINHELP32-OF2 RemoteMinor Buffermedium Overrun CVE-2002-0823(2) 4857 TROJAN: BackTROJAN:BACKORIFICE:BO2K-CONNECT Orifice 2000Major Client Connectionhigh CVE-1999-0660 1648 HTTP: FrontpageHTTP:FRONTPAGE:FP30REG.DLL-OF fp30reg.dllCritical Overflowcritical CVE-2003-0822 9007 SCAN: IIS EnumerationSCAN:II:IIS-ISAPI-ENUMInfo info P2P: DC: DirectP2P:DC:HUB-LOGIN ConnectInfo Plus Plus Clientinfo Hub Login TROJAN: AOLTROJAN:MISC:AOLADMIN-SRV-RESP Admin ServerMajor Responsehigh CVE-1999-0660 TROJAN: DigitalTROJAN:MISC:ROOTBEER-CLIENT RootbeerMinor Client Connectmedium CVE-1999-0660 HTTP: OfficeHTTP:STC:DL:OFFICEART-PROP Art PropertyMajor Table Bufferhigh OverflowCVE-2009-2528 36650 HTTP: AXIS CommunicationsHTTP:STC:ACTIVEX:AXIS-CAMERAMajor Camerahigh Control (AxisCamControl.ocx)CVE-2008-5260 33408 Unsafe ActiveX Control LDAP: IpswitchLDAP:OVERFLOW:IMAIL-ASN1 IMail LDAPMajor Daemonhigh Remote BufferCVE-2004-0297 Overflow 9682 HTTP: AnyformHTTP:CGI:ANYFORM-SEMICOLON SemicolonMajor high CVE-1999-0066 719 HTTP: Mini HTTP:CGI:W3-MSQL-FILE-DISCLSRSQL w3-msqlMinor File View mediumDisclosure CVE-2000-0012 898 HTTP: IIS MFCHTTP:IIS:MFC-EXT-OF ISAPI FrameworkMajor Overflowhigh (via
    [Show full text]
  • T AMPEREEN AMMATTIKORKEAKOULU WEB 2.0 Opas
    T AMPEREEN AMMATTIKORKEAKOULU OPINNÄYTETYÖ WEB 2.0 Opas kotiäideille Leena Hurskainen Tietojenkäsittelyn koulutusohjelma maaliskuu 2008 Työn ohjaaja: Petri Heliniemi T AMPERE 2008 TAMPEREEN AMMATTIKORKEAKOULU _____________________________________________________________________________ Tekijä(t) Leena Hurskainen Koulutusohjelma(t) Tietojenkäsittely Opinnäytetyön nimi Web 2.0 – Opas kotiäideille Työn valmistumis- kuukausi ja -vuosi maaliskuu 2008 Työn ohjaaja Petri Heliniemi Sivumäärä: 46 TIIVISTELMÄ Opinnäytetyö aihe on lähtöisin opinnäytetyöntekijän omasta elämäntilanteesta. Internetin avulla löytyi useita erilaisia palveluita, joita pystyi käyttämään hyväksi uudessa kotiäitiydes- sä. Web 2.0 – ilmiön yksi esiintymismuoto on sosiaalinen media. Monelle Internetin käyttä- jälle tämä termi on täysin outo, mutta kun tarkastelee niitä palveluita, mitä verkosta haetaan, niin yhä useampi on käyttänyt Web 2.0-palveluja. Viime vuosina suosiotaan ovat kasvattaneet erilaiset keskustelupalstat, blogit, verkkokaupat ja lukuisat muut Web 2.0-palvelut. Opinnäytetyön tarkoitus on esitellä keskeisiä Web 2.0:n palveluita ja niiden käyttäjäryhmänä on ajateltu kotiäitejä. Web 2.0 on terminä uusi ja sen ilmenemismuodot muuttuvat jatkuvasti. Suurin osa lähdemateriaalista on löytynyt Internetistä. Opinnäytetyössä käsiteltyihin palvelui- hin tutustuminen on tapahtunut käytännössä Internetissä ja näiden tietojen pohjalta on kasattu opinnäytetyössä esiteltävät asiat. Erilaisia Web 2.0 – palveluita, joita kotiäidit, ja myös muut Internetin käyttäjät voivat hyödyntää,
    [Show full text]