Reflective Report on Bluetooth Security and Learning Experiences

Verified

Added on  2023/06/04

|11
|2362
|474
Report
AI Summary
This report is a reflective analysis of a student's learning experience related to Bluetooth security. It begins with an executive summary, followed by an introduction that defines learning experiences and their context within a research proposal on Bluetooth security. The discussion section evaluates the effectiveness and usefulness of the learning experiences, emphasizing the value of gaining new knowledge, developing skills, and the importance of continuous learning. The report details how the learning process will be beneficial in the student's academic and professional future, particularly in addressing Bluetooth security vulnerabilities. The report also describes the learning process, including the research methods used, such as qualitative research and the collection of secondary data, and the identification of research gaps in prior studies. Furthermore, the report evaluates the learning gained, including the importance of understanding the research process and the application of the findings in future research endeavors, the importance of addressing security vulnerabilities, and the application of the knowledge acquired during the research in the future. The conclusion summarizes the key takeaways and the overall value of the learning experience.
Document Page
Running head: BLUETOOTH SECURITY
Bluetooth Security
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1BLUETOOTH SECURITY
Executive Summary
The report provides reflective writing that details about the learning and understanding the
learning experiences acquired from the previously done research proposal. The paper evaluates
the effectiveness and usefulness of the learning experiences.The paper explains how this learning
process will be useful to me considering various aspects that include future career and life in
general. The report details about what has been learned, and it also explains the learning process
highlighting the reason behind doing the particular activities in previous assignments.The paper
also explains how this learning will be applied by me in my future.
Document Page
2BLUETOOTH SECURITY
Table of Contents
Executive Summary.........................................................................................................................1
Introduction......................................................................................................................................3
Discussions......................................................................................................................................3
Effectiveness and Usefulness of the Learning Experiences........................................................3
Usefulness of the Learning Process.............................................................................................4
Happenings of the Learning Process...........................................................................................5
Evaluation of the Learning..........................................................................................................6
Explanation of the Learning........................................................................................................6
Application of the Learning.........................................................................................................7
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Document Page
3BLUETOOTH SECURITY
Introduction
Learning Experience of a particular topic of research includes any interaction, course,
program or any other type of experience in which learning takes place (Kolb 2014). It can take
place in the general or traditional academic settings or the nontraditional or unconventional
settings. It may involve traditional educational interactions or nontraditional interactions. This
report discusses the about the learning and the learning experiences which have been earned
from the previously conducted research proposal that was done on the topic of Bluetooth
Security (Padgette, 2017). The report discusses the effectiveness and the usefulness of the
learning experiences and details about the opinion and the value of this experience. The paper
also discusses how this learning experience would be useful to me considering several aspects.
The paper details about the observations that were noticed by me during the learning process.
This paper also evaluates the key aspects was learned by me and explains the learning process by
discussing the reasons behind doing the previous assignment 1 and assignment 2. The paper
discussed about how this learning will be applicable in the future.
Discussions
Effectiveness and Usefulness of the Learning Experiences
The learning experience from any particular research of any topic refers to the
interaction, program or the overall experience which is gained during the research or learning
(Verbert et al. 2014). In this case, from the previous research proposal that has been done by me,
I come to know about the various aspects and issues related to the topic of the research and its
applications that are being used almost daily in our life (Fetzer and Doyle 2015).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4BLUETOOTH SECURITY
There is an enormous value of the learning experience, from the learning experience gathered by
me, it would help me to grow as an individual, develop my knowledge base and it would give the
scope to improve myself for the betterment. Learning something, which is new, will give us the
access to the new and varying opportunities and it would give me the chance to try out and
venture new experiences in the future. Learning new things and gaining a learning experience is
very important for not only me but everyone for gaining self-esteem (Orth and Robins 2014). By
learning new things, it would help the brain cells to remain active, and it would allow me to
succeed at something, which is new and give us the opportunity to appreciate our self for the
endeavour (Erwin, Marchetto and Gage 2014). Learning new things and gaining learning
experience would help me to develop new skills.
Usefulness of the Learning Process
From the learning experience earned by me while doing, the research would be beneficial
to me in several aspects. It would help me to accomplish my assignments and would give me
vivid knowledge about Bluetooth security, which would, in turn, be useful to work in other
projects and research topics, which I would be able to address in the course and the program of
our curriculum (Mishra and Tamboli 2017). In future, if I get any job opportunity where the topic
of research, which has been conducted, comes into play, I would be comfortable to address it.
The new knowledge that I have gained from the research proposal on the topic Bluetooth
Security and its vulnerabilities, from this research I gained a lot of knowledge about the various
aspects related to the Bluetooth security. I am aware of the several vulnerabilities and issues
related to the Bluetooth technology and various ways to enhance the security of the Bluetooth.
With this knowledge, I would be able to prevent myself from the people who are behind this
assault of Bluetooth. I can also share my knowledge with other people so that they can be aware
Document Page
5BLUETOOTH SECURITY
of the various Bluetooth vulnerabilities and be careful while they are using Bluetooth technology
aided devices. In the future, if I work in any research and development organisation, I can use
my knowledge, which I gained while doing this research in making further work or progress
regarding the enhancement of the Bluetooth technology security.
Happenings of the Learning Process
In the previous research proposal, I did vivid research on the various assaults pertaining
to the use of the Bluetooth technology on products and devices that are used in our daily lives. I
conducted thorough research from various secondary sources of data and identified BlueSnarfing
as the most commonly used assault pertaining to the use of Bluetooth technology (Zhao, Zhang
and Zhang 2014). I also gathered information from various secondary sources of data of various
researchers who already did some research on the topic and it was included in the literature
review of the research proposal. The research topics of researchers done earlier included the
ways to improve the Bluetooth Security, Analysis of the Bluetooth security Vulnerabilities,
Secure connections in Bluetooth Scatternets and Efficient Intrusion Detection, Prevention
System, for the Bluetooth Network and attack and detection on the Bluetooth enabled cell
phones (Butun, Morgera and Sankar 2014). From these researches, I had also learned and
noticed that there are research gaps in almost all the researches that have been conducted by the
researchers earlier. These research gaps need to be addressed and solved so that it provides a
better awareness and security related to the use of the Bluetooth technology in the devices and
products that are almost used daily. The data which was used for conducting the research, I made
use of the qualitative research method that required the collection of secondary data. The
secondary data was collected from the peer-viewed journals and relevant books. I had also
Document Page
6BLUETOOTH SECURITY
identified the primary and secondary research question in the research proposal pertaining to the
Bluetooth security in devices or products aided with the Bluetooth technology.
Evaluation of the Learning
The concept of Business Research includes gaining and gathering information that
includes identification of the opportunities and goals for the business. The business research
done for the topic of Bluetooth security and all the aspects related to the usage of Bluetooth
technology in various products and devices that are used in the daily lives helped me in the
research learning process. It provided me with the insights related to the concerned topics and the
secondary researches that also guided me to understand and comprehend the type and variety of
researches that had been done earlier related to the concerned topic of Bluetooth Security. From
the qualitative research methods, which I used during the research, I understood that it requires
the use of rigorous systematic and scientific information. The data are usually in the form of
words rather than numbers. The data are concerned with individuals’ perceptions of specific
topics, issues and situations. It was also noticed by me, as a business researcher that the results
obtained from the research methods were descriptive than predictive. The data collection and
analysis were conducted simultaneously for the research. From the related researches conducted
earlier, I was able to identify the research gap from each of the research done on the related topic
of Bluetooth security (Dissanayake 2013).
Explanation of the Learning
The activities that were done in the assignment 1 and the assignment 2 make us aware of
the importance of security and make us aware of the vulnerabilities associated with the wireless
connection like the Bluetooth technology that makes use of the radio waves instead of the wires
or cables. The earlier assignments identified the gaps present in, the earlier conducted researches
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7BLUETOOTH SECURITY
pertaining to the Bluetooth Security that had been identified in the Literature review. In the
earlier assignments, the research questions which includes the primary question shave been
identified. Thus, these research questions need to be addressed in order to enhance the security of
the Bluetooth technology and be more aware of the various vulnerabilities related to the usage of
the Bluetooth Technology (Pieterse and Olivier 2014). The earlier assignments provide a solid
research methodology that supports the feasibility of the research project. The research
methodology addresses the research instrument, research location and schedule and provides a
critical assessment of the limitations of the methodology and the expected outcome of the
research project.
Application of the Learning
From the learning process I would be well are of the research methods that are required
for conducting a proper research proposal, and I can apply this knowledge in future while
conducting the research. In the future, I will be well aware of which research methodology to use
from qualitative method to quantitative methods, according to the topic of research. This
knowledge will help me to save the time while conducting any research in future and I will be
able to complete the research before time. In future, I will be able to prevent or curtail the
limitations, which I faced while conducting the previous research, this would allow me to make
proper and flawless research in future. Next time in the future, when I will be doing any research
during my course and future profession, I can utilise the knowledge gathered during the previous
research and make the future research more relevant and appropriate. I can also make people
aware of the knowledge, which I acquired during this research, and transfer it to the people so
that they also become aware of the limitations that are faced during a research. I would be able to
help people to make them aware of the various research methodology and which research
Document Page
8BLUETOOTH SECURITY
methodology to use and provide details about the secondary as well as the primary research
methodologies.
Conclusion
From the previous research proposal, I get a vivid learning experience and understanding
that would be useful and effective to me in various ways. This learning experience and outcome
would be crucial to me in various ways that had been discussed earlier, this learning outcome
and experience would be beneficial to me in future for my growth as well as knowledge.
Document Page
9BLUETOOTH SECURITY
References
Altman, S. and Rattner, Z., On Guard LLC, 2016. Personal security system. U.S. Patent
Application 14/731,913.
Butun, I., Morgera, S.D. and Sankar, R., 2014. A survey of intrusion detection systems in
wireless sensor networks. IEEE communications surveys & tutorials, 16(1), pp.266-282.
Dissanayake, D.M.N.S.W., 2013. Research, research gap and the research problem.
Erwin, J.A., Marchetto, M.C. and Gage, F.H., 2014. Mobile DNA elements in the generation of
diversity and complexity in the brain. Nature Reviews Neuroscience, 15(8), p.497.
Fetzer, D.K. and Doyle, T.F., Qualcomm Inc, 2015. Wireless tracking device. U.S. Patent
9,092,963.
Kolb, D.A., 2014. Experiential learning: Experience as the source of learning and development.
FT press.
Mishra, S. and Tamboli, S.M., 2017. Adaptive Bluetooth Network for Secure Data
Transfer. Journal of Network Communications and Emerging Technologies (JNCET) www.
jncet. org, 7(4).
Orth, U. and Robins, R.W., 2014. The development of self-esteem. Current Directions in
Psychological Science, 23(5), pp.381-387.
Padgette, J., 2017. Guide to bluetooth security. NIST Special Publication, 800, p.121.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10BLUETOOTH SECURITY
Pieterse, H. and Olivier, M.S., 2014. Bluetooth command and control channel. Computers &
Security, 45, pp.75-83.
Verbert, K., Govaerts, S., Duval, E., Santos, J.L., Assche, F., Parra, G. and Klerkx, J., 2014.
Learning dashboards: an overview and future research opportunities. Personal and Ubiquitous
Computing, 18(6), pp.1499-1514.
Zhao, T., Zhang, G. and Zhang, L., 2014, December. An overview of mobile devices security
issues and countermeasures. In Wireless Communication and Sensor Network (WCSN), 2014
International Conference on (pp. 439-443). IEEE.
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]