writing ....

User Generated

U124

Computer Science

A1

Description

I need a support to write a document about “Zoom/Teams and Open Source Conference Systems and their privacy issues “the document should focus only on the comparison between the solution of the privacy issues in each paper in Zoom/Teams and Open Source Conference Systems and it should at least 7 pages.

The responses should be seven pages in length, not including the title or reference pages and using APA style guidelines,

The references should not before 2019 and not in the list below:

Aiken, A. (2020). Zooming in on privacy concerns: Video app Zoom is surging in popularity. In our rush to stay connected, we need to make security checks and not reveal more than we think. Index on Censorship, 49(2), 24-27.

Botha, R., & Furnell, S. (2021). Facing up to security and privacy in online meetings. Network Security, 2021(5), 7-13.

DJEKI, E., DEGILA, J., BONDIOMBOUY, C., & ALHASSAN, M. H. (2021, November). Security Issues in Digital Learning Spaces. In 2021 IEEE International Conference on Computing (ICOCO) (pp. 71-77). IEEE. Retrieved from; https://ieeexplore.ieee.org/abstract/document/9673575

Isobe, T., & Ito, R. (2021). Security Analysis of End-to-End Encryption for Zoom Meetings. IACR Cryptol. ePrint Arch., 2021, 486. Retrieved from; https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9462825

Kagan, D., Alpert, G. F., & Fire, M. (2020). Zooming into video conferencing privacy and security threats. arXiv preprint arXiv:2007.01059.‏

Mahr, A., Cichon, M., Mateo, S., Grajeda, C., & Baggili, I. (2021). Zooming into the pandemic! A forensic analysis of the Zoom Application. Forensic Science International: Digital Investigation, 36, 301107.

Mohanty, M., & Yaqub, W. (2020, September). Seamless authentication for online teaching and meeting. In 2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM) (pp. 120-124). IEEE.

Singh, J., & Chaudhary, N. K. (2022). OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities. Journal of Information Security and Applications, 65, 103091.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Related Tags