Author(s):  
Mahvish Ponum ◽  
Sumbal Samad ◽  
Rukhshanda Ramzan

With the advent of computer networks, e-mentoring becomes feasible and indispensable to enlighten protégés. E-mentoring comes into play where conventional mentoring is unable to assist students, if they are unable to reach at specified location and time. This chapter elucidates concepts, challenges, impact, and evaluation of e-mentoring by referencing scholars. This chapter retains juxtaposition of traditional mentoring and e-mentoring, which is computer-mediated communication (CMC). It also explains technologies for e-mentoring like web-based and different programs that have been carried out in literature. This chapter also includes best practices and the role of e-mentoring in different fields such as medicines, entrepreneurs, and for students with disabilities.


Author(s):  
Ayman Kayssi ◽  
Ali El-Hajj ◽  
Mahmoud El Assir ◽  
Ramzi Sayyid
Keyword(s):  

2011 ◽  
Vol 268-270 ◽  
pp. 1253-1258
Author(s):  
Jie Liang ◽  
Jian Wei Sun

Application layer vulnerabilities represent a substantial portion of the security exposures of computer networks. In this paper, we explore the effectiveness of HTTP-session model to effectively describe web access behavior. HTTP-sessions are extracted from http requests as accessed by users. Based on the HTTP-session model and the analysis of web based attacks, we present an active anomaly detection framework to detect web based attacks. We demonstrate the effectiveness of the proposed methods via simulation studies using real-world web access requests. The result shows that our methods can effectively detect the application layer attacks.


1998 ◽  
Vol 30 (3) ◽  
pp. 282
Author(s):  
Mark A. Holliday
Keyword(s):  

1998 ◽  
Vol 62 (9) ◽  
pp. 671-674
Author(s):  
JF Chaves ◽  
JA Chaves ◽  
MS Lantz
Keyword(s):  

2013 ◽  
Vol 23 (3) ◽  
pp. 82-87 ◽  
Author(s):  
Eva van Leer

Mobile tools are increasingly available to help individuals monitor their progress toward health behavior goals. Commonly known commercial products for health and fitness self-monitoring include wearable devices such as the Fitbit© and Nike + Pedometer© that work independently or in conjunction with mobile platforms (e.g., smartphones, media players) as well as web-based interfaces. These tools track and graph exercise behavior, provide motivational messages, offer health-related information, and allow users to share their accomplishments via social media. Approximately 2 million software programs or “apps” have been designed for mobile platforms (Pure Oxygen Mobile, 2013), many of which are health-related. The development of mobile health devices and applications is advancing so quickly that the Food and Drug Administration issued a Guidance statement with the purpose of defining mobile medical applications and describing a tailored approach to their regulation.


2008 ◽  
Vol 41 (8) ◽  
pp. 23
Author(s):  
MITCHEL L. ZOLER
Keyword(s):  

2009 ◽  
Vol 42 (19) ◽  
pp. 27
Author(s):  
BRUCE JANCIN
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document