Sie sind auf Seite 1von 22

20thDecember,2013 Chennai From M.Ashok kumar, Sastha Kudil, No:4/163,G.S.T.Road, Vandalur, Chennai-48.

To The Manager, HR department, Nishat chunian limited, Chennai-55. Sir, Sub: Applying for the post of software Trainee -reg Ref: Your advertisement in Jobportal.comwebsite With reference to the above I wish to offer myself as a candidate for the post of Software Trainee in your reputed organization. I am B.TECH graduate in IT and feel to be eligible for the above mentioned post as a fresher. I have enclosed my resume for your perusal and kind consideration. Given a chance I shall discharge my duties to the satisfaction of the Authorities and prove my worth. Looking forward for your positive reply.

Thanking you. Yours Faithfully M.Ashok kumar

RESUME

M.ASHOK KUMAR
m.ashokkumar.it@gmail.com Mob. : 9840922356

OBJECTIVE :

Seeking a challenging position in software field where I can be a creative and successful software Engineer and enhance my technical skills to prove myself to be an asset to the organization wherever my services can be utilized. EDUCATION:

Standard / Degree

Institution

Board / Institute Anna unniversity

Year of Passing Doing 3rd year

Percentage of Marks

B.TECH(IT)

Rajalakshmi institute of technology Chennai-600124 St.Anns Matric Hr. Sec. School, Madhananthapuram, Chennai 600 116. St.Anns Matric Hr. Sec. School, Madhananthapuram, Chennai 600 116.

76

HSC

Board of Higher Secondary

2008

74

SSLC

Matriculation Board

2006

82

CERTIFICATION PROGRAM:

Undergone a full time course for JAVA SOFTWARE EXPOSURE:

Operating System Package

: :

Windows 98 /2K /XP Ms-Office

PROJECT DETAILS Title Description : : college website CLI using JAVA and mySQL

EXPERIENCE :

One year as trainer & One year as software engineer at Lanson Pvt. Ltd.from 14/7/2010 to 20/08/2012 Koyambedu, Chennai 600 107. Working as a team trainer at harsha velappanchavadi Chennai 600077. pvt ltd from 03/09/2012 to till date

AREA INTERESTED :

Embedded systems

PERSONAL DETAILS:

Name Date of Birth Fathers Name Marital Status Nationality Address

: : : : : :

M.Ashok kumar 26th march 1990 D.Murugesan (LATE) Single Indian 103, 6th Cross Street, Mangala Nagar, Porur, Chennai 600 116.

Languages Known

Read : English, Tamil Write : English, Tamil Speak : English, Tamil

DECLARATION I hereby declare that all the above written statement is true and complete to the best of my knowledge and belief.

Date :

Yours faithfully,

Station : Chennai. (M.ASHOK KUMAR)

TECHNICAL TOPIC

CYBER CRIME
WHAT IS CYBER CRIME? Cyber crime is the new breed of crime, which is either perpetrated using computers, or is otherwise related to them. Its origin can be traced to the growing dependence on computers in modern life. Cyber crime has assumed sinister implications today as everything from microwave ovens and refrigerators to nuclear power plants is being run on computers. Today, the world is moving towards a point where everything from banking stock exchanges, are traffic control, telephones to electric power, health care, welfare and education depends on software. This exponential growth, and the increase in the capacity and accessibility of computers coupled with the decrease in cost, has brought about revolutionary changes in every aspect of human civilization, including crime. As a result, the increased capacities of information systems today come at the cost of increased vu Inerrability. Information technology has begun to produce criminal opportunities of a variety that the brightest criminals of yore could not even begin to dream about. A cyber crime may be theft o ~f information services, communications in furtherance of criminal conspiracies, telecommunications piracy, electronic money laundering, electronic vandalism and terrorism, sales and investment fraud, illegal interception of telecommunications, and electronic funds transfer fraud. The precedent for theft of information services was set by the 'phone breakers' more than three decades ago for what has become a major criminal industry. In this method of crime, the perpetrators gain access to the PBX board of an organization, and make their own calls or sell call time to third parties. The advent of information technology has enhanced the activities the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system.

It is a good idea to rely on another computer system to run programs and store data as it would enable clients to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet. Data would not be confined to a hard drive on one user's computer or even a corporation's internal network. Also, it could bring hardware costs down as the client would not need to buy the fastest computer with the most memory, because the cloud system would take care of the rest. Instead, a client could buy an inexpensive computer terminal with a monitor, a keyboard and mouse and just enough processing power to run the middleware necessary to connect to the cloud system. If the cloud computing system's back end is a grid computing system, then the client could take advantage of the entire network's processing power. Often, scientists and researchers work with calculations so complex that it would take years for individual computers to complete them. On a grid computing system, the client could send the calculation to the cloud for processing. The cloud system would tap into the processing power of all available computers on the back end, significantly speeding up the calculation. While the benefits of cloud computing seem convincing, security and privacy are perhaps its biggest concerns. The idea of handing over important data to another company worries some people. Corporate executives might hesitate to take advantage of a cloud computing system because it would not allow them to keep their company's information under lock and key. The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place. Otherwise, the service would lose all its clients. Hence, it's in their interest to employ the most advanced techniques to protect their clients' data. Cloud computing companies will need to find ways to protect client privacy. One way is to use authentication techniques such as user names and passwords. Another is to employ an authorization format whereby each user can access only the data and applications relevant to his or her job. Then there are a few standard hacker tricks that could cause In a cloud computing system, there is a significant workload shift. Instead of local computers, the network of computers that make up the cloud do all the heavy

lifting when it comes to running applications. This results in decrease of hardware and software demands on the user's side. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest. Web- based e-mail service like Hotmail, Yahoo! Mail or Gmail do not run an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account does not exist on your computer but on the service's computer cloud. Although cloud computing is an emerging field, the idea has been around for a few years. It is called cloud computing because the data and applications exist on a 'cloud' of Web servers. A cloud computing system can be divided into two sections: the front end and the back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. It includes the client's computer (or computer network) and the application required to access the cloud computing system. The back end is the 'cloud' section of the system. Various computers, servers and data storage systems that create the 'cloud' of computing services are present here. In theory, a cloud computing system could include practically any computer program you can imagine, from data processing to video games. Usually, each application will have its own dedicated server. A central server administers the system, monitoring traffic and client demands to ensure everything runs smoothly. It follows a set of rules called protocols and uses a special kind of software called middleware. Middleware allows networked computers to communicate with each other. If a cloud computing company has a lot of clients, there is likely to be a high demand for a lot of storage space. Some companies require hundreds of digital storage devices. Cloud computing systems need at least twice the number of storage devices it requires to keep all its clients' information stored. That is because these devices, like all computers, occasionally break down. A cloud computing system must make a copy of all its clients' information and store it on other devices. The copies enable the central server to access backup machines to retrieve data that otherwise would be unreachable. Making copies of data as a backup is called redundancy.

The applications of cloud computing are practically limitless. With the orientation of the craft in space. The first star sensor packed up on April 26, and even the back-up sensor failed during the second week of May. Moon/Space mission failures are not unusual for countries and organizations. Chandrayaan-1 will act as a great motivator for planning of Chandrayaan-2. India has joined the United States, the former Soviet Union and the European Space Agency comprising 17 countries who already have their flags on the moon. ISRO is planning second moon mission Chandrayaan-2 in 2013. Russia's Federal Space Agency (Roskosmos) is joining with ISRO for development of Chandrayaan-2 Lander/Rover. Chandrayaan-2 will consist of the spacecraft and a landing platform with the moon rover. The rover would move on wheels on the lunar surface, pick up samples of soil or rocks, do a chemical analysis and send the data to the spacecraft orbiting above. The rover will weigh between 30 kg and 100 kg, depending on whether it is to do a semi-hard landing or soft landing. The rover will have an operating lifespan of a month. It will run predominantly on solar power. Types:
1. 2. 3. 4. 5. 6. 7. 8. 9.

THEFT OF TELECOMMUNICATIONS SERVICES COMMUNICATIONS IN FURTHERANCE OF CRIMINAL CONSPIRACIES TELECOMMUNICATIONS PIRACY DISSEMINATION OF OFFENSIVE MATERIALS ELECTRONIC MONEY LAUNDERING AND TAX EVASION ELECTRONIC VANDALISM, TERRORISM AND EXTORTION SALES AND INVESTMENT FRAUD ILLEGAL INTERCEPTION OF TELECOMMUNICATIONS ELECTRONIC FUNDS TRANSFER FRAUD

CybercrimeIndia.org is website formed with a motive to provide help and safety to Indian Internet users from online frauds, scams, hacking, cyber attacks and phishing activities. We also provide consultation for issues like defamation, copy right, trademark and domain name registrations.

Copyright act: Trademark is a legal identity of an individual, business enterprise or firm to provide a unique identity to the products and services they provide to their consumers. A trademark can be a name, word, phrase, symbol, design, image or logo to have a unique identity. Copyright Act provides a safeguard to the authorization rights of the producer or author of the creation, which protects and inhibits the usage of the original work in any form without the permission of the author. This act thus protects and encourages the creativity of any artist or author. It covers the scope of any writer, artist, designer, cinematographer, musician, sound records and computer software, etc. Identify theft: Identity theft actually is way through which criminals somehow obtains the personal information of people who identity they want to use for any illegal purpose. The Identity theft can lead to serious consequences as the criminal can use the information for immigration or other such important applications. For more details on cyber defamation or for having any advice regarding any cyber defamation case please contact us. Account Takeover is a kind of situation where the criminal uses the information which he has stolen in order to have the access of victim's existing accounts. Then there may be further misuse using the existing accounts like changing the address so that bill does not reach to victim's place and criminal can enjoy shopping and purchases online through the credit cards the thief runs up. Defamation: When any sort of defamation is done using internet then it is called Cyber Defamation. Cyber defamation is a crime which is conducted in cyberspace mostly through the medium of Internet with an aim to defame a person or a company. Online fraud: It is easy to connect to a large number of people using the internet, here the strength of the internet working as a tool for the scammer. With the internet they can fool a large number of people in a short period of time and before that you

realize that you fall pray of online fraud you would become a victim of online fraud. Internet with its numerous advantages always remains in news all across the globe for different reasons. If there are good services and features to make the life easier and secure then there are also loopholes that work against its benefits to destroy the balance and create trouble. The virtual world is no exception to it, everyday developers and security professionals are coming forward with great features offering better security, but on the other side of it, there are community of scammers and hackers who are constantly trying to transgress the security wall and access the valuable information that is supposed to remain protected and secured. Types of Cyber Crime Cybercrime is defined as crimes committed on the internet using computer as a tool and we innocents are the target. There are various forms of cyber crime like Spamming. I am sure all of us has encountered unwanted product advertisements. PIRACY is also a serious threat that involves illegal reproduction and distribution of software applications, games, movies and audio CDs which is causing a huge monetary loss to entertainment industry world wide Hacking is also a serious crime by a hacker who is simply a talented computer user who misuse his vast knowledge . Virus attacks that say I love you enters our computer and destroys all the computer information are also a serious threat. Computer frauds , thefts and harassments through social networking sites like orut and facebook are also daggering our lives. Undoubtedly we cannot single out only one crime that is posing maximum threat but all forms of crimes are equally posing a serious threat to both business and individuals. Ways to fight cyber crime by individuals. To fight back the individual and businessman should be proactive, not reactive We do not have to remain at the receiving end of crime forever. The fight against cyber crime starts in our very own home .We should not reply any e-mail from unknown persons, we should learn to report spam mails to the e-mail servers .We should not upload our personal information on social networking sites or our account details on other such sites. Also the use antivirus soft wares can be a great help to fight against viruses and worms.

Ways to fight cyber crime by government The author of the "Lovebug" virus remains free because his nation did not have cyber crime laws. The "AnnaKournikova" virus caused billions of dollars in damage, but the individual who distributed it received only 150 hours of community service as a penalty Cybercrime is not armed robbery, not pen and paper crime and should not be handle as such. Fighting Cybercrime requires intelligent knowledge and that has to be IT intelligence. What I mean is this, men of the regular Police force should not be allowed to investigate crimes committed over the internet. IT experts should be recruited into law enforcement agencies to assist in the fight.At this hour when cyber crime is growing in leaps and bounds with growing technology the government need to strengthen criminal penalties against computer crimes; work to harmonize laws against cyber crime internationally; and improve coordination among law enforcement authorities in different jurisdictions.

Conclusion There will always be new and unexpected challenges to stay ahead of cyber criminals and cyber terrorists but we can win only through partnership and collaboration of both individuals and government. There is much we can do to ensure a safe, secure and trustworthy computing environment. It is crucial not only to our national sense of well-being, but also to our national security and economy.

NON-TECHNICAL TOPIC

Using Mobile Phones to Improve Educational Outcomes: An Analysis of Evidence from Asia
Abstract Despite improvements in educational indicators, such as enrolment, significant challenges remain with regard to the delivery of quality education in developing countries, particularly in rural and remote regions. In the attempt to find viable solutions to these challenges, much hope has been placed in new information and communication technologies (ICTs), mobile phones being one example. This article reviews the evidence of the role of mobile phone-facilitated mLearning in contributing to improved educational outcomes in the developing countries of Asia by exploring the results of six mLearning pilot projects that took place in the Philippines, Mongolia, Thailand, India, and Bangladesh. In particular, this article examines the extent to which the use of mobile phones helped to improve educational outcomes in two specific ways: 1) in improving access to education, and 2) in promotingnew learning. Analysis of the projects indicates that while there is important evidence of mobile phones facilitating increased access, much less evidence exists as to how mobiles promote new learning. Introduction For quite some time, the international development community has emphasized the paramount role of education in bringing about sustainable socio-economic development in the South. Goal 2 of the United Nations Millennium Development Goals (MDGs) aims to achieve universal primary education for children everywhere, boys and girls alike, by 2015. Significant challenges remain, however. For example, in southern Asia the enrolment ratio has reached 90%, but there still remain more than 18 million children of primary school age who are not enrolled. Similar challenges confront secondary and tertiary education. In developing countries, on average, only 54% of children of the appropriate age attend secondary school currently (UN, 2008, pp. 13-14). Additionally, more than one-third of the worlds adult population most living in the developing world has no access to printed knowledge, new skills, and technologies that could improve the quality of their lives (Dhanarajan, 2009, p.

46). Inequalities in access to education continue to pose major barriers in the developing world, and the delivery of cost-effective and quality education remains a persistent problem. In the attempt to find viable solutions to these problems, much hope has been placed in new information and communication technologies (ICTs). It is believed that ICTs can empower teachers and learners by facilitating communication and interaction, offering new modes of delivery, and generally transforming teaching and learning processes. Of the many different forms of ICTs, mobile phones are thought, for several reasons, to be a particularly suitable tool for advancing education in developing regions. First, mobiles phones are the most prevalent ICT in the developing world, and the penetration rate is rising rapidly. In Asia, mobile penetration has doubled within a short span of time; in 2001, average penetration was 19.7 per 100 inhabitants while in 2005 the penetration rate rose to 40.9 (Orbicom, 2007). Also relevant is the fact that mobile phone ownership is increasingly more common in the lower socio-economic segments of society (Samrajiva & Zainudeen, 2008). Second, mobile phones are an especially good leapfrogger since they use the radio spectrum. There is, therefore, less need for new physical infrastructure such as roads and phone wires, and base-stations can be powered via generators in places where there is no electrical grid (Economist, 2008). Finally, in addition to voice communication, mobile phones allow the transfer of data, which can be particularly useful for delivering educational content over long distances. The concept of mobile learning (mLearning) understood for the purposes of this article as learning facilitated by mobile devices is gaining traction in the developing world. The number of projects exploring the potential of mobile phonefacilitated mLearning in the developing world is steadily growing, spurred in part by the use of mobile technology in the educational sector in the developed world which has expanded from short-term trials on a small scale to large-scale integration. However, there remains a lack of analysis that brings together the findings of the rising number of mLearning projects in the developing world. With the increasing attention now being given to the role of mobiles in the educational sector in developing countries, there is a need at this juncture to take stock of the available evidence of the educational benefits that mobile phones provide in the developing world. Consequently, this article explores the results of six mLearning projects that took place in several developing countries in Asia the Philippines, Mongolia, Thailand, India, and Bangladesh both because most developing-country mLearning interventions are being undertaken in Asia and because developments in Asia seem to indicate that the region could become the

global leader in educational uses of mobiles (Motlik, 2008). In exploring how mobile phone-facilitated mLearning contributes to improved educational outcomes, this article examines two specific issues: 1) the role of mobiles in improving access to education, and 2) the role of mobiles in promoting new learning, those new learning processes and new instructional methods currently stressed in educational theory. Of note, the projects reviewed deal with both formal and non-formal education as defined by Dighe, Hakeem, and Shaeffer (2009, p. 60). The structure of the article continues as follows. After the introduction, the article engages with the literature that discusses how mobile technology can address the problems of access confronting the educational sector as well as mobile technologys role in relation to new learning. The article then examines six pilot projects that involved the use of mobile phones for education in developing countries in Asia, analyzing the pilot projects in order to determine whether the supposed benefits that the literature outlines hold true in the developing world. The article concludes with a discussion of the potential of mobile phone-facilitated mLearning as well as with indications for possible future areas of research. Theories of Mobile Learning The literature on mLearning points to a variety of benefits that mobile phones could have on the educational sector. For heuristic purposes, the impacts of mobile phones on educational outcomes that are identified in the mLearning literature can be classified into two broad categories. On the one hand, mobiles supposedly impact educational outcomes by improving access to education while maintaining the quality of education delivered. On the other hand, mobiles purportedly impact educational outcomes by facilitating alternative learning processes and instructional methods collectively known as new learning. The Role of Mobiles in Improving Access to Education In theory, mLearning increases access for those who are mobile or cannot physically attend learning institutions those who would not otherwise be able to follow courses in a traditional educational setting due to the constraints of work, household activities, or other competing demands on their time. MLearning makes education more accessible in that it enables learners to pursue their studies according to their own schedule. The portability of mobile technology means that mLearning is not bound by fixed class times; mLearning enables learning at all times and in all places, during breaks, before or after shifts, at home, or on the go. Interestingly, however, while mLearning is portable, it is not necessarily associated

with physical movement. According to a study conducted by Vavoula, few people actually utilize the time spent in transit to learn (Sharples, Taylor, & Vavoula, 2005, p. 3). MLearning, as Visser and West (2005) suggest, can also increase access in those situations where cost represents a significant barrier to learning (p. 132). For those in rural or remote areas where environmental and infrastructure challenges hinder other learning modalities, particularly eLearning, mLearning presents great opportunities. For the individual learner, mobile technology is much less costprohibitive than other technologies like personal computers and broadband connections that are necessary for eLearning. The ubiquity of mobile phones, moreover, means that educational services can be delivered with learners existing resources. In as much as mobile technology presents a less cost-prohibitive medium for learning, it represents an important avenue by which to reduce the gap between the haves and the have-nots in contemporary society where access to knowledge and information is increasingly important (VanWeert, 2005). In regards to cost, the benefit of increased access afforded by mLearning is particularly relevant in the developing country context. Many developing countries are completely bypassing investments in costly, fixed telephone infrastructure for the installation of mobile phone networks (Motlik, 2008; Sharples, Taylor, & Vavoula, 2007, p.224; Traxler & Dearden, 2005). Thus, mLearning provides a potential way forward for the expansion of education programs to larger segments of the population rather than via the eLearning model that has been adopted in much of the developed world. MLearning allows a method of educational delivery that could be more cost-effective than eLearning methods, not to mention that the ubiquity of mobile phones means that many people are already familiar with mobile phone applications (Motlik, 2008). In so much as mLearning exerts an impact on educational outcomes by increasing access, mLearning represents a continuation and improvement of distance learning through increased utility and applicability (Keegan, 2002, p. 7). MLearning, the literature suggests, broadens the availability of quality education materials through decreased cost and increased flexibility while also enhancing the efficiency and effectiveness of education administration and policy.

The Role of Mobiles in Promoting New Learning


Others suggest that the benefits of mobile phones are not merely limited to increased access to educational services. MLearning, they indicate, can also facilitate changes in the character of learning modalities that in turn impact

educational outcomes. In this regard, mLearning represents more than a mere extension of traditional forms of education; mLearning facilitates alternative learning processes and instructional methods that the theories of new learning identify as effective for learning. According to proponents of new learning, mobiles facilitate designs for personalized learning in that they are responsive to difference and diversity in the way learning occurs. They facilitate designs for situated learning by providing learning during the course of the activity in the field for a botany student, in the classroom for a teacher trainee, or in the workshop for an engineer. In this sense, mLearning also facilitates designs for authentic learning, meaning learning that targets real-world problems and involves projects of relevance and interest to the learner (Kukulska-Hulme & Traxler 2007, pp.184-86; Traxler, 2007, p. 7). The supposed value of mobiles also arises from the manner in which they facilitate lifelong learning. Mobiles can support the great amount of learning that occurs during the many activities of everyday life, learning that occurs spontaneously in impromptu settings outside of the classroom and outside of the usual environment of home and office. They enable learning that occurs across time and place as learners apply what they learn in one environment to developments in another (Sharples et al., 2005, pp. 2, 4; 2007, pp. 222-23). Mobile phones theoretically make learner-centred learning possible by enabling students to customize the transfer of and access to information in order to build on their skills and knowledge and to meet their own educational goals (Sharples et al., 2007, p. 223). MLearning thus exerts a democratizing effect on the learning experience as learners take a greater responsibility for the learning process instead of being passively fed information by an instructor. Whereas in traditional models of education the goal is the transfer of knowledge from teacher to student, mLearning empowers students to actively participate in the learning process to make it a process of construction and not mere instruction (dela Pena-Bandalaria, 2007). MLearning thus represents learning that is not just-in-case, education for the sake of producing a bank of knowledge, but rather represents learning that is just-in-time, just enough, or just-for-me (Traxler, 2007, p. 5). As a facilitator of new learning, mLearning goes beyond an emphasis on the possession of information to enabling learners to find, identify, manipulate, and evaluate existing information (Brown, 2003, p. 2). Mobiles can also supposedly facilitate knowledge-centred learning by providing efficient and inventive methods by which students can learn with understanding meaning that they deepen their understanding of a specific subject matter rather

than merely memorizing large amounts of information and then use this knowledge as a basis for new learning through integration and interconnection. Mobile devices make possible assessment-centred learning as well by enabling the provision of continual feedback throughout the learning process, presenting learners with diagnosis and formative guidance as to what might be improved or what might be learned next. Moreover, in providing prompt feedback, mLearning maintains the appeal of learning and provides a motivating factor that can at times be lacking in traditional modes of education (Geddes, 2004). Mobile phones also facilitate community-centred learning, meaning learning that the learner deems valuable because of its relevance to the surrounding social context; mLearning facilitates learning that can be used to achieve socio-economic goals that respond to problems, such as problems related to health or family care confronting the surrounding community (Sharples et al., 2007, p. 223; Wagner & Kozma, 2005, pp. 83-85). Given that social interaction is central to effective learning, as indicated by theories of new learning, mobile phones should also impact educational outcomes by facilitating communication. Mobiles permit collaborative learning and continued conversation despite physical location and thus advance the process of coming to know, which occurs through conversations across contexts and among various people. Via mobile technology, learners engage in conversation whereby they resolve differences, understand the experiences of others, and create common interpretations and shared understanding of the world (Nyiri, 2002; Sharples et al., 2007, p. 225-26). In promoting educational modalities that accord with the theories of new learning, mLearning should offer an appeal aspect that also impacts educational outcomes. MLearning can be particularly appealing for those who have not succeeded in traditional learning environments; it can attract those not enamoured by traditional learning approaches that are generalized and decontextualized in nature. MLearning is also beneficial in that it can provide immediate feedback and thus provide continued motivation for those who are not motivated by traditional educational settings. Moreover, mLearning presents an appeal simply because the use of mobile technology in and of itself presents something new and exciting for a great array of learners (Geddes, 2004, p. 4). Mobiles, therefore, should impact educational outcomes by altering the character of education and learning because the nature of mobile technology converges with and facilitates new learning. The new learning is personalized, learner-centred, situated, collaborative, ubiquitous, and lifelong. Likewise, mobile technology is increasingly personal, user-centred, mobile, networked, ubiquitous, and durable

(Sharples et al., 2007, p. 224). The literature indicates that the benefits afforded by this convergence should exert a positive impact on educational outcomes. Methodology In light of the theories as to how mLearning should solve access problems as well as facilitate new learning, the authors sought to examine the existing evidence so as to confirm, or refute, the purported benefits advanced by the literature. To this end, the authors identified relevant mLearning pilot projects by conducting a search of academic publications and conference proceedings, as well as conducting a general Internet search. The projects were selected according to the following criteria: 1. Projects that demonstrate the use of mobile phones for educational (formal and non-formal) purposes, 2. Projects that were implemented in the low-income/lower-middle income countries of Asia-Pacific1, 3. Projects that clearly document results and have evidence, both qualitative and quantitative, such that definitive conclusions can be drawn regarding the impact of mobile phones on educational outcomes via increased access to education and/or via contribution to promoting new learning. Six projects met the criteria of the search and are discussed in the section that follows (see Table 1 for brief summary). The search revealed that most mLearning projects have been implemented in the developed countries of Europe, North America, and Asia-Pacific; mLearning projects in the developing countries of Asia have been few in number2. Moreover, of the projects undertaken, only a select few were documented in a manner that allows analysis of results. For the six selected cases, project reports and project-related, peer-reviewed publications served as the source for information. Some key limitations of the study must be taken into consideration when generalizing the findings. Firstly, the study depended on the validity of the data presented by the sources. To minimize this limitation, the authors reviewed the appropriateness of the methodologies for each project in order to ensure, to the best of their knowledge, that they were acceptable. Secondly, the absence of a process of collecting primary data for this study meant that, in some cases, the data resulting from the projects reviewed did not always relate to the research question of this study. Consequently, some of the projects produced only limited information concerning the indicators that this study assessed.

Das könnte Ihnen auch gefallen