The report discusses the learning experience and understanding gained from the previously conducted research proposal on Bluetooth Security. It evaluates the effectiveness and usefulness of the learning experiences and explains how this learning process will be useful in the future.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: BLUETOOTH SECURITY Bluetooth Security Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1BLUETOOTH SECURITY Executive Summary The report provides reflective writing that details about the learning and understanding the learning experiences acquired from the previously done research proposal. The paper evaluates the effectiveness and usefulness of the learning experiences.The paper explains how this learning process will be useful to me considering various aspects that include future career and life in general. The report details about what has been learned, and it also explains the learning process highlighting the reason behind doing the particular activities in previous assignments.The paper also explains how this learning will be applied by me in my future.
2BLUETOOTH SECURITY Table of Contents Executive Summary.........................................................................................................................1 Introduction......................................................................................................................................3 Discussions......................................................................................................................................3 Effectiveness and Usefulness of the Learning Experiences........................................................3 Usefulness of the Learning Process.............................................................................................4 Happenings of the Learning Process...........................................................................................5 Evaluation of the Learning..........................................................................................................6 Explanation of the Learning........................................................................................................6 Application of the Learning.........................................................................................................7 Conclusion.......................................................................................................................................7 References........................................................................................................................................8
3BLUETOOTH SECURITY Introduction Learning Experience of a particular topic of research includes any interaction, course, program or any other type of experience in which learning takes place (Kolb 2014). It can take place in the general or traditional academic settings or the nontraditional or unconventional settings. It may involve traditional educational interactions or nontraditional interactions. This report discusses the about the learning and the learning experiences which have been earned from the previously conducted research proposal that was done on the topic of Bluetooth Security (Padgette, 2017). The report discusses the effectiveness and the usefulness of the learning experiences and details about the opinion and the value of this experience. The paper also discusses how this learning experience would be useful to me considering several aspects. The paper details about the observations that were noticed by me during the learning process. This paper also evaluates the key aspects was learned by me and explains the learning process by discussing the reasons behind doing the previous assignment 1 and assignment 2. The paper discussed about how this learning will be applicable in the future. Discussions Effectiveness and Usefulness of the Learning Experiences Thelearningexperiencefromanyparticularresearchofanytopicreferstothe interaction, program or the overall experience which is gained during the research or learning (Verbert et al. 2014). In this case, from the previous research proposal that has been done by me, I come to know about the various aspects and issues related to thetopic of the research and its applications that are being used almost daily in our life(Fetzer and Doyle 2015).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4BLUETOOTH SECURITY There is an enormous value of the learning experience, from the learning experience gathered by me, it would help me to grow as an individual, develop my knowledge base and it would give the scope to improve myself for the betterment. Learning something, which is new, will give us the access to the new and varying opportunities and it would give me the chance to try out and venture new experiences in the future. Learning new things and gaining a learning experience is very important for not only me but everyone for gaining self-esteem (Orth and Robins 2014). By learning new things, it would help the brain cells to remain active, and it would allow me to succeed at something, which is new and give us the opportunity to appreciate our self for the endeavour (Erwin, Marchetto and Gage 2014). Learning new things and gaining learning experience would help me to develop new skills. Usefulness of the Learning Process From the learning experience earned by me while doing, the research would be beneficial to me in several aspects. It would help me to accomplish my assignments and would give me vivid knowledge about Bluetooth security, which would, in turn, be useful to work in other projects and research topics, which I would be able to address in the course and the program of our curriculum (Mishra and Tamboli 2017). In future, if I get any job opportunity where the topic ofresearch, which has been conducted,comes into play, I would be comfortable to address it. The new knowledge that I have gained from the research proposal on the topic Bluetooth Security and its vulnerabilities, from this research I gained a lot of knowledge about the various aspects related to the Bluetooth security. I am aware of the several vulnerabilities and issues related to the Bluetooth technology and various ways to enhance the security of the Bluetooth. With this knowledge, I would be able to prevent myself from the people who are behind this assault of Bluetooth. I can also share my knowledge with other people so that they can be aware
5BLUETOOTH SECURITY of the various Bluetooth vulnerabilities and be careful while they are using Bluetooth technology aided devices.In the future, if I work in any research and development organisation, I can use my knowledge, which I gained while doing this research in making further work or progress regarding the enhancement of the Bluetooth technology security. Happenings of the Learning Process In the previous research proposal, I did vivid research on the various assaults pertaining to the use of the Bluetooth technology on products and devices that are used in our daily lives. I conducted thorough research from various secondary sources of data and identified BlueSnarfing as the most commonly used assault pertaining to the use of Bluetooth technology (Zhao, Zhang and Zhang 2014). I also gathered information from various secondary sources of data of various researchers who already did some research on the topic and it was included in the literature review of the research proposal. The research topics of researchers done earlier included the ways to improve the Bluetooth Security, Analysis of the Bluetooth security Vulnerabilities, Secure connectionsin BluetoothScatternetsand EfficientIntrusion Detection,Prevention System, for the Bluetooth Network and attack and detection on the Bluetooth enabled cell phones (Butun, Morgera and Sankar2014). From these researches, I had also learned and noticed that there are research gaps in almost all the researches that have been conducted by the researchers earlier. These research gaps need to be addressed and solved so that it provides a better awareness and security related to the use of the Bluetooth technology in the devices and products that are almost used daily.The data which was used for conducting the research, I made use of the qualitative research method that required the collection of secondary data. The secondary data was collected from the peer-viewed journals and relevant books.I had also
6BLUETOOTH SECURITY identified the primary and secondary research question in the research proposal pertaining to the Bluetooth security in devices or products aided with the Bluetooth technology. Evaluation of the Learning The concept of Business Research includes gaining and gathering information that includes identification of the opportunities and goals for the business. The business research done for the topic of Bluetooth security and all the aspects related to the usage of Bluetooth technology in various products and devices that are used in the daily lives helped me in the research learning process. It provided me with the insights related to the concerned topics and the secondary researches that also guided me to understand and comprehend the type and variety of researches that had been done earlier related to the concerned topic of Bluetooth Security.From the qualitative research methods, which I used during the research, I understood that it requires the use of rigorous systematic and scientific information. The data are usually in the form of words rather than numbers. The data are concerned with individuals’ perceptions of specific topics, issues and situations.It was also noticed by me, as a business researcher that the results obtained from the research methods were descriptive than predictive. The data collection and analysis were conducted simultaneously for the research.From the related researches conducted earlier, I was able to identify the research gap from each of the research done on the related topic of Bluetooth security (Dissanayake 2013). Explanation of the Learning The activities that were done in the assignment 1 and the assignment 2 make us aware of the importance of security and make us aware of the vulnerabilities associated with the wireless connection like the Bluetooth technology that makes use of the radio waves instead of the wires or cables. The earlier assignments identified the gaps present in, the earlier conducted researches
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7BLUETOOTH SECURITY pertaining to the Bluetooth Security that had been identified in the Literature review. In the earlier assignments, the research questions which includes the primary question shave been identified. Thus, these research questions need to be addressed in order to enhance the security of the Bluetooth technology and be more aware of the various vulnerabilities related to the usage of the Bluetooth Technology (Pieterse and Olivier2014). The earlier assignments provide a solid researchmethodologythatsupportsthefeasibilityoftheresearchproject.Theresearch methodology addresses the research instrument, research location and schedule and provides a critical assessment of the limitations of the methodology and the expected outcome of the research project. Application of the Learning From the learning process I would be well are of theresearch methods that are required for conducting a proper research proposal, and I can apply this knowledgeinfuture while conducting the research. In the future, I will be well aware of which research methodology to use from qualitative method to quantitative methods, according to the topic of research. This knowledge will help me to save the time while conducting any research in future and I will be able to complete the research before time. In future, I will be able to prevent or curtail the limitations, which I faced while conducting the previous research, this would allow me to make proper and flawless research in future.Next time in the future, when I will be doing any research during my course and future profession, I can utilise the knowledge gathered during the previous research and make the future research more relevant and appropriate.I can also make people aware of the knowledge, which I acquired during this research, and transfer it to the people so that they also become aware of thelimitations that are faced during a research. I would be able to help people to make them aware of the various research methodology and which research
8BLUETOOTH SECURITY methodology to use and provide details about the secondary as well as the primary research methodologies. Conclusion From the previous research proposal, I get a vivid learning experience and understanding that would be useful and effective to me in various ways. This learning experience and outcome would be crucial to me in various ways that had been discussed earlier, this learning outcome and experience would be beneficial to me in future for my growth as well as knowledge.
9BLUETOOTH SECURITY References Altman, S. and Rattner, Z., On Guard LLC, 2016.Personal security system. U.S. Patent Application 14/731,913. Butun, I., Morgera, S.D. and Sankar, R., 2014. A survey of intrusion detection systems in wireless sensor networks.IEEE communications surveys & tutorials,16(1), pp.266-282. Dissanayake, D.M.N.S.W., 2013. Research, research gap and the research problem. Erwin, J.A., Marchetto, M.C. and Gage, F.H., 2014. Mobile DNA elements in the generation of diversity and complexity in the brain.Nature Reviews Neuroscience,15(8), p.497. Fetzer, D.K. and Doyle, T.F., Qualcomm Inc, 2015.Wireless tracking device. U.S. Patent 9,092,963. Kolb, D.A., 2014.Experiential learning: Experience as the source of learning and development. FT press. Mishra,S.andTamboli,S.M.,2017.AdaptiveBluetoothNetworkforSecureData Transfer.Journal of Network Communications and Emerging Technologies (JNCET) www. jncet. org,7(4). Orth, U. and Robins, R.W., 2014. The development of self-esteem.Current Directions in Psychological Science,23(5), pp.381-387. Padgette, J., 2017. Guide to bluetooth security.NIST Special Publication,800, p.121.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10BLUETOOTH SECURITY Pieterse, H. and Olivier, M.S., 2014. Bluetooth command and control channel.Computers & Security,45, pp.75-83. Verbert, K., Govaerts, S., Duval, E., Santos, J.L., Assche, F., Parra, G. and Klerkx, J., 2014. Learning dashboards: an overview and future research opportunities.Personal and Ubiquitous Computing,18(6), pp.1499-1514. Zhao, T., Zhang, G. and Zhang, L., 2014, December. An overview of mobile devices security issues and countermeasures. InWireless Communication and Sensor Network (WCSN), 2014 International Conference on(pp. 439-443). IEEE.