Monday, May 25, 2020

Technology Is Effective And Efficient Form Of Teaching

When my partner and I were looking for options on what to research, we decided that we were going to research something that we were actually interested on, we decided to research â€Å"Technology in Physical Education†. Many would think to themselves, how can technology be useful in PE? Technology over the years has played a big role in improving PE and finding out new ways to better students. Technology in PE is effective and efficient form of teaching, it’s accessible, and best used when the technology is appropriate. The way that technology can be effective in PE is by making sure that the technology you are using is having a positive impact in your classroom and your teaching methods. There are some technology that has a huge impact on†¦show more content†¦By being able to go online, you can teach students many things. As health concerns, you can show the kids healthy food choices at a young age so as they grow they start to realize for themselves what is healthy and unhealthy. Also, when teaching a certain sport or trying to explain something, a teacher can simply go online and research more on the topic to get a better understanding of what has to be taught. By showing the student’s videos of how to do certain things, the students can understand it better so when it is time to perform the task they can recall to watching the video and perform the task. There are also many inspiration videos so that they kids can get motivated and excited to attend gym class. When a teacher isn’t strong in a certain subject they can go online and research more so that when it is time to present to the class they can be more familiar with the topic and effectively teach the students on what to do. Accessibility plays a huge role because teachers have the ability to adapt to the way different learning styles of students. There are different kind of games that the teacher can teach so that each student can have fun and learn out of. There are some kids who learn in different ways. Some are visual learners, some need extra explanation, and most important, there are some kids who are overweight and have disabilities. But

Thursday, May 14, 2020

Self-Esteem an Social Media - 985 Words

Facebook Activity and Self-Esteem Self-Esteem Self-esteem serves as the foundation for many components of who we are and our views on life. High levels of self-esteem have been correlated with greater satisfaction in multiple important aspects of life, including professions, salaries, relationships, and physical health (Orth, 2012). While good self-esteem can be associated with many benefits, low self-esteem is accompanied by countless negative qualities. In a recent study, it was found that adolescents who experienced a decrease in self-esteem experienced more symptoms of depression both in adolescence, and in their thirties, supporting the notion that low self-esteem as well as decreases in self-esteem can be directly linked with†¦show more content†¦Although social media use has gone up in general, research has shown that individuals with certain personality traits are more likely to use them and more often. These traits include extroversion, not being very conscientious, being more open to experiences, higher neu roticism levels (Kalmus, 2011; Wilson, 2010). The reasons behind all this time spent on online social networking are first to spend extra time, and following that, to keep up with friends and communicate (Ozguven, 2013). Social media effects. With the increasing popularity of social media usage, there has been accompanying attention on the effects that spending large amounts of time on these websites can have. Research looking at the effects that perceptions of online social networking circles have on self-esteem, and life-satisfaction revealed a positive roll social media can play. The subsequent data indicated that larger online social circles, regardless of the closeness of these acquaintances, result in individuals feeling like they have a lot of social support, and in turn, they experience greater life-satisfaction (Manago, 2012). Although there are clearly pros and cons to social media, most of the research focuses on the negative aspects of online social networking, poss ibly due to the widespread and excessive use of it by adolescents and young adults. In 2005, nearly 80% ofShow MoreRelatedSocial Media and Self-Esteem Essay3946 Words   |  16 PagesSocial media and Self-esteem Anh Phung Abstract In this day and age, social media has become an integral part of our lives. It has created a platform for people to share information instantly and communicate with people all around the world. Facebook is the most outstanding example of successful social media network. According to the first quarter 2015 earnings announcement by Facebook, the site has achieved 1.44 billion active users per month, and 65% of which are daily active users. Other socialRead MoreImpact Of Social Media On Self Esteem2052 Words   |  9 Pages Affects Social media has on Self-esteem Olivia Nelson Victory Charter School This paper explains about the affects social media has on our self-esteem as teenagers and how cyberbullying is a major problem in our society because there is nothing we can do about it. Social media is a major part of our lives and every day routines so when we take a step back and realize what we have done or have been doing then we know how negative it can be. Social media will forever depict whoRead MoreSocial Media And Its Effects On Self Esteem And Self Control1422 Words   |  6 PagesAre Facebook users gaining any benefits from the popular social media site or just unconsciously being affected by all the negatives? Thanks to Mark Zuckerberg, Facebook launched in 2004 and has been growing in popularity ever since. The purpose of Facebook is to allow individuals to voice what matters to them all while connecting and engaging with others. The social media platform has users accessing worldwide and according to Facebook’s newsroom, in 2015 there was an average of 1.04 b illion activeRead MoreSocial Media s Effect On Self Esteem929 Words   |  4 Pagesinformation that discuss social media’s effect on one’s self-esteem. The sources used are â€Å"Social Comparison, Social Media, and Self-Esteem†, an article printed in â€Å"Psychology of Popular Media† written by Vogel et al. (2014) and â€Å"Facebook Envy: How the Social Network Affects our Self-Esteem† an internet article written by Andrea Shea (2004) found at http://www.wbur.org/2013/02/20/facebook-perfection. The sources share comparative information on the widespread use of social networking sites (SNSs)Read MoreSocial Media And Its Impact On Individual Self Esteem Essay1981 Words   |  8 PagesSince social media is a relatively new concept, many of the practical implications of using social networking sites are still being studied. For many research psychologists and sociologists alike, how use of social media affects one’s individual self-esteem, well-being, and overall mental health is a great area of research. Previous research has yielded highly differing, and sometimes conflicting results. For example, in their systemic review of literature from 2003-2013, Best, Manktelow, and TaylorRead MoreSocial Media And Its Effects On People s Self Esteem Essay2204 Words   |  9 PagesAlmost everyone possesses some form of social media that links them to the rest of the world. Society and culture are so intertwined with social media that it is natural for â€Å"myths† to emerge. These myths include the notions that social media boosts self-esteem, that people’s privacy is protected as long as only friends are able to view their profiles, and that it is an accurate, effective news outlet. Despite the benefits of the connection brought by social media, there are serious drawbacks and manyRead MoreThe Impact of Social Media Upon Self Esteem2506 Words   |  11 Pagesis different now. Thanks to recent advances in techn ology and the Internet, it could be argued that we are much more social beings. If we need feedback on something, it can be attained in seconds. While this concept does present many possible benefits, there are many disadvantages. Say an aspiring artist creates what she thinks could be her best masterpiece yet, an intricate self-portrait painted on a colorful canvas. Like most artists, she wants others to appreciate her piece, so she posts it onRead MoreSocial Media Has A Heavy Influence On An Individuals Self Esteem1389 Words   |  6 Pagesover and becomes a part of our existential being. This paper will address how this virtual reality in the form of social media has a heavy influence on an individual’s self-esteem. Merriam-Webster denotes this (‘self-esteem’) as a â€Å"feeling of having respect for yourself and your abilities† (Onomatopoeia, n.d.). Having both positive and negative effects, we will see how social media usage is portrayed on a global scale, as well as on an individual level. The methods I’ll be using are identifyingRead MoreSocial Media Has a Negative Effect on Body Image and Self Esteem1202 Words   |  5 Pages Social media has become one of the most popular sources of communication for the upcoming generation. For young people growing up in today’s society, social media outlets such as Facebook, Instagram and Twitter have provided pictures and news that have become the first thing that their eyes see in the morning and the last thing that they see before bed. These pictures have provided unrealistic standards as to what is considered beautiful in today’s society. As young people refer to these imagesRead MoreEssay On Social Media1697 Words   |  7 Pagesafter social media use, in case closed ended questions did not accurately encapsulate the feelings of the participant. The second question gathered data on the favorite social media platform for participants, options included Facebook, Instagram, snapchat, twitter, other and an I don’t use social media choice. This information was used to gage the focus of participants for the rest of the survey. Next, a semantic dif ferential question asked participants how they felt after using social media on a

Wednesday, May 6, 2020

Relational Theory Of Romantic Relationships - 1336 Words

After reading your story, it is a reoccurring situation that has been brought to the attention of many relational theorists. Studies have shown romantic relationships are challenged and go through various stages of relational maintenance that may not always be positive. However, the conceptualization of negativity in romantic relationships is often dismissed. As a society, there has been the glorification of love and how romantic relationships should play out. Whether it is through the representations featured in literature, film, music or other media platforms, the concepts of soul mates, â€Å"love conquers all†, and the idea of â€Å"meant to be† are ideologies that have led people to believe in an idealized and perfected construct of what love in romantic relationships is. Society has convinced itself through the portrayals of love that â€Å"mind-blowing, transcendent romantic relationships† are a â€Å"normal part of living† (Klosterman, 3). People s pend lifetimes searching for love and once found they will do all they can to hold onto it because love is perceived as the solution to people’s problems and the key to true happiness. However, this conceptualization of love leads people to fabricate relationships based on â€Å"fake love† (Klosterman, 3). The idea that love and attraction toward a romantic partner is a never ending leads to the ideology relationships are immortal to termination. Simply, romantic love is considered to be untouchable, but this is a disillusioned perception. There isShow MoreRelatedRelationship Between Long Distance Relationships1588 Words   |  7 PagesDespite the fact that relationships can be troubling, stressful, and even deadly, most of us are aware that we need relationships with others and that the quality of our lives depends on those relationships whether it is from friends or romantic partners. With the development of technology the evolution of long distance dating relations hips are transforming. Long distance relationships used to primarily consist of handwritten letters with the occasional phone call in between. However, progressionRead MoreRelationship Satisfaction Is An Important Part Of Romantic Relationships1295 Words   |  6 PagesRelationship satisfaction is an important part of romantic relationships. A lack of satisfaction can lead to consequences in other areas of life and eventually, the destruction of the relationship. For example, job performance is heavily influenced by romantic relationship satisfaction. In a study by Greenhaus and Beutell (1985), they argued that poor satisfaction leads to poor job performance and vice versa. They stated this was to because these two spheres are â€Å"interdependent.† Satisfaction canRead MoreThe Communication Behavior Of Long Distance Relationships Essay926 Words   |  4 Pagescommunication behavior in long distance relationships. This paper will examine the behavior of how couples sustain their relationship being in long distance relationships and long distance relationships in military separation. How do females in the military maintain long distance relationships? Crystal Jiang, L., Hancock, J. T. (2013). Absence makes the communication grow fonder: geographic separation, interpersonal media, and intimacy in dating relationships. Journal Of Communication, 63, 556-577Read MoreLeonid Afremov’s Painting, Alley by the Lake995 Words   |  4 PagesSecure romantic relationships are based on trust and understanding. They are developed over time and tend to last the longest; however, just because a couple feels secure doesn’t mean the couple is necessarily happy. While every healthy relationship shines with rays of trust and happiness, shadows often lurk filled with lies and deceit. A painting, entitled Alley by the Lake, by Leonid Afremov portrays the secure, yet secret, side to relationships. Happiness holds relationships together. FindingRead MoreCommunication Differences : Symbolic Interactionism And Relational Dialectics760 Words   |  4 PagesThe two communication theories I will feature are Symbolic Interactionism and Relational Dialectics. As defined in our text book, Symbolic Interactionism refers to how â€Å"humans act toward people, things and events on the basis of the meanings they assign to them.† (Cite your textbook) while Relational Dialectics states â€Å"social life is a dynamic knot of contradictions, a ceaseless interplay between contradictory or opposing tendencies such as integration-separation, stability-change, and expression-nonexpression†Read MoreEssay on Communication Traits of Happy Couples1638 Words   |  7 Pagescouples who are happy and those who are not, through all stages of a relationship. They have found that many of the traits that begin in a dating relationship will carry over into a marriage. Researchers have turned to the ways in which these happy couples communicate and the ways that not so happy couples communicate in order to find a common thread between couples who stay committed to one another while being satisfied in the relationship. There are communicative traits practiced by these couples whoRead MoreThe Effects Of Personal Attachment Style On Romantic Relationship Satisfaction1718 Words   |  7 PagesStyle on Romantic Relationship Satisfaction Our earliest relationships in life can be deeply formative in shaping our development. Created by John Bowlby, attachment theory relates the importance of attachment in regards to personal development. According to Bowlby, attachment is the leading factor in our ability to form and maintain relationships as adults (Levy 2012, pg. 157). As human beings, we need to feel as if we belong (Cherry, 2016). We find this belongingness in our relationships and attachmentsRead MoreThe Most Important Aspect Of Communication898 Words   |  4 Pagescommunication classes, and try our best to apply the lessons to our real life relationships. Although my class uses projects to challenge our knowledge, I know your class takes tests, so I’m going to help you review in this letter! In my opinion, the most important aspect of communication is the way we manage different types of relationships. In the following paragraphs, I’ll help you review topics such as why various relationship types matter, how we form them, and what distinguishes them from each otherRead MoreThe Priming Of Attachment Style And The Effects On Romantic Relationship Satisfaction1734 Words   |  7 PagesStyle and Relationship Satisfaction: The Priming of Attachment Style and the Effects on Romantic Relationship Satisfaction Milynn C. Scheer Point Loma Nazarene University â€Æ' Introduction Our earliest relationships in life can be deeply formative in shaping our development. Created by John Bowlby, attachment theory relates the importance of attachment in regards to personal development. According to Bowlby, attachment is the leading factor in our ability to form and maintain relationships as adultsRead MoreEmotive Leadership Theory And Perspective Essay1453 Words   |  6 PagesThe following essay attempts to critically analyse ‘emotive’ leadership theory and perspective. This will be done by both academic research and popular moods. Furthermore, this essay seeks to define emotive leadership, gain insight, ask if emotive leadership is relevance in the modern leadership and to question if emotive leadership is a romantic myth as suggested by Jackson and Parry along with trust issues within organisations. With the aid of popular moods to further the critical analysis throughout

Tuesday, May 5, 2020

Management of Information Technology; A Case Study Approach

Question: Describe about the Management of Information Technology for A Case Study Approach. Answer: Introduction Background and analysis A web server is an application that is responsible for the collection and servicing web pages upon the request of a client, and they are stored in computer hard drives. Notably, the main objective of security on a network is to keep off strangers not allowed to access the servers, hence a web server configured poorly damages a firewall that is properly designed. In an internet environment, the web server is properly configured to authenticate and recognize various users and with distinct privileges of access such as PeopleSharz company. Web servers are usually possible targets for(hackers) hence the need for security as a tool for administration of intranet and internet connected servers.it is possible that the hackers accessed information from the website of PeopleSharz through the common gateway interface(CGI) script that operate 24 hours in web servers. These scripts handle different user inputs from numerous browsers of the web, return information to clients and have access to databases, making it more vulnerable to attacks.it presents loopholes in sec[1]urity as it shows information from the host that assists attackers with mechanisms of breaking through the servers to access data of PeopleSharz Company. Additionally, it present challenges as its commands are easily executable and harm the unwanted machine causing complete damage. Another point of potential loophole is on the access control that explains on people granted viewing rights on the web server of peoplesharz.it also determines who to execute the elements in the CGI scripts, while integrity and privacy is an important issue of consideration in preventing data theft and corruption of content. There are also threats arising from data transmission through TCP/IP protocol as it was not designed to maintain the highest levels of security, giving room for unauthorized access of data. Therefore an eavesdropper may listen to the transfer of confidential online documents from one server t another or during transmission of end-user information that is private. There is a high probability of denial of service attacks where the attacker aims at shutting down network servers, therefore resulting in restriction on accessibility of data. Its associated negative impacts include the alteration of information and network components and the consumption of limited and non-renewable resources. Additionally, the features offered by complex servers include execution of CGI scripts, processing, and handling of errors in scripts plus on the fly directory listings.it is also important in getting the server rights and permissions to facilitate the safeguarding of information that are sensitive n nature and CGI scripts, since there are two file system roots in operation. Conclusively, the above explained security concerns show extensively the nature to which the servers of PeopleSharz company as corrupted and confidential information retrieved.it is important to block these loopholes in a bid to ensure and enhance the safety of necessary information on the project of PeopleSharz and protecting their passwords on their sites to prevent intruder access as presented in the case study. Analysis Of Threats The matters for consideration in the investigation concerning breach of protocol of servers of PeopleSharz Company include the hosting provider, HotHost1, and technical support manager in the Hotel. It is also important to investigate the type of attack initiated by the hacker to help in the swift and efficient solving of problems presented by the network server breach. Additionally, the potential risks and associated outcomes of hacking into the system of PeopleSharz is also an important matter for investigation as it will help in the successful gauging of the impact of the system. It is important to note that hacking activities in organizations systems have adverse potential effects to the operations and reputation of the company. Investigation of associated risks According to the excerpt, PeopleSharz Companys objective is to establish itself as a financially stable and self-sufficient company upon hitting their reported target of 50M users of their application. They have also incorporated production mechanisms into their advertising of the revenue model they are developing and hope to have better-enhanced results financially. The partners of the company, Mark Bukerrzberg and peter Tweet have managed to publicize the brand of the internet organization globally and they hope to make it a player in the social media place. Furthermore, the company is updating itself and continually responding and innovating requirement if users, trends in industries and competitive challenges. They have also established a development workshop in Sydney of 20 personnel called technology Hub which proves to be a busy environment. Therefore, considering the achievements of PeopleSharz company over the past one year, the associated risk comes in form of Social and economic losses. The investments made by the co-owners of the company is wasted as the confidential information of their working over the years is revealed to the whole world and published in newspapers. Subsequently, the number of personnel employed by the company will lose their jobs due to the liquidation and loss of resources by the company. It can also lead to shutting down of its branches established such as the one in Sydney and this would prove costly to the operations of the internet company. The attacks on a web server have varying effects according to the type of attack launched by the hacker and the target audience, which in this case are the users of the applications of the company. Investigations on the type of hacking attack on the server Networks and data are vulnerable to the following types of attacks if there are no security measures in place to protect them. Eavesdropping Generally, a number of communications on networks occur in insecure formats allowing the attacker gain access to paths of data through listening and reading the traffic. In the event of an attacker eavesdropping on communications, it is called sniffing and it is the biggest problem of security facing enterprise administration. It is possible that the hacker obtained confidential information on the company through means of eavesdropping in communications between the cofounders of the company. Attacks on passwords This is the most probable type of attack on the internet company as it is stated that the passwords if important applications were exposed to users in the social media. Most networks are operated on an access of applications through passwords which involves the use of usernames and identity factors and this allows attackers gain access to the server. Attackers gain access to servers by posting as authorized users, making him acquire administrative rights, and after entry into the system, it is possible that they do the following. Obtaining lists of names of computers, valid users and information on networks Modifying the network and server configurations such as routing tables and control of access Rerouting, deleting and modifying the data of the PeopleSharz internet company. Denial of service attack As explained earlier, denial of service attack prevents utilization of networks and computers by authorized users, and the attacker is capable of doing the following on access of the network to PeopleSharz Internet Company. Sending data that is not valid for network services such as the moment when data was sent to other social Medias showing the password of the organization. Blocking traffic to result in loss of network access Flooding of an entire computer system leading to shutdown of the network Sniffer attack This enables the attacker to monitor, read and capture data from a network when there is communication in packets of information. It enables the sniffer to analyze network and have access to information to finally corrupt a network and read relevant communication between the partners of the internet company. Man in the middle attack This breach in protocol occurs where there is a listener during communication between two people who actively monitors, controls and captures information. The man the middle assumes identity of a person in order to read the message and has same effects as the applications layer attack which include; Disabling security measures to facilitate future attacks Termination of operating systems and data applications Reading and deleting of data in a network. Issues to be looked for and tested It is prudent to look for and test the many ways with which website servers are exploited, and they include; The malware that reveal the credentials of the administrator which are used to access resources of PeopleSharz Company. It is important to look for and test the operating systems server vulnerabilities which provide access to attackers. A keener looks into databases containing personal and financial information which are usable by hackers in fraudulent activities The Denial of Service attacks should be tested and looked into to avoid stoppage of businesses of the internet company and web services disruption. Methodologies Used In Investigations The methodologies used in investigation of the risks and major issues of concern affecting the breach of protocol of PeopleSharz Internet Company include; The use of forensic analysis Hiring of specialized computers specialists Analysis of data transfer and involvement of law enforcement agencies when fraudulent activities are involved. Conclusively, the above explained investigative procedures and matters for consideration serve in helping in the identification of possible problems associated with the hacking activity. It further assists in the determination of the appropriate prompt course of action to be taken to help in remedying the situation at hand and preventing further attacks on the internet company servers. Dependencies And Success Factors For The Job For the successful coordination of activities of the investigation into the breach of web servers of the internet company, it is important to have the necessary support needed to solve the problem. These range from business stakeholders to developers of most network servers and experts on the field of computing and programming of schedules. The board of directors The board of directors of the company is in charge of providing the necessary human and financial resources to facilitate investigative procedures, therefore Mark Buckerberger and Peter Tweet are to provide finances. Stakeholders of the PeopleSharz Company Stakeholders of the PeopleSharz Company are to provide any relevant information related to the breach of protocol and access to information lot. They are to help in the tracing of who sent the message and at what time they received the passwords of the company. The roles of designers The roles of designers are undoubtedly noticed as they are in charge of developing safer and enhance web servers with a priority on security measures taking center stage in its formation. This helps in the reducing the chance if risks of attacks by the hackers and therefore guaranteeing to a larger extent its safety and use by only allowed people. Computer experts are expected to assist in the development of strong firewall mechanisms since the development of a working site accommodating large numbers of people is demanding. When each and every member of an organization, by association either directly or indirectly, plays his roles in the operation of finding hackers, it will facilitate quick investigations. Comparatively, all these factors withstanding, PeopleSharz Company will effectively find the perpetrators of the violence which will lead to their arrest and prevention of future attacks on the company. Recommendations There is the need for expertise and sufficient resources in successfully fending off highly sophisticated and systematic attack on web servers of PeopleSharz Company. Consequently, the following recommendations are applicable in ensuring there is a minimization of current and future planned attacks on the web server systems of any other company experiencing the same challenge. They include; For prevention, the following measure should be undertaken in creating needs and specification defining management of the web server systems. The definition of guidelines on pa[3]tch policy which demands the use of most invented and recent updates on the security of web servers. This should be in connection with available systems externally and applies to the operating systems applied. There should be an adoption of maximum restrictions on access to databases through applications on the websites such as HTTP requests. HTTP request is restricted through the use of Apache and other relevant firewalls so that limited requests such as get and post are allowed. There should be a development of a two staged concept that has its own web service interfaces to increase the security of databases. There should be enhanced and clear guidelines on a security of accessing the services of the websites. There should be the restriction on administrative interfaces access in a way that its availability is not possible through the whole internet. The administrative interfaces should be outsourced and made available internally within PeopleSharz Company. There should be continual auditing by specialists. There should be checking of applications of the website through reviews of codes. In case there is no possibility of increasing the security of the application itself, there is room for use of application firewalls and hardware appliances. These will help in the increment of security levels but will not replace the set guidelines. It is suggested that critical systems are subjected to security auditing by specialists before they are used. For purposes of increasing security levels of the components of web management system, the following solutions are recommended; The apache web server security is to be increased through the application of mod security. The passwords saved in databases should be encrypted. The applications should be capable of assisting the users to select passwords that are of higher security levels, for example where minimum characters are needed. One should pay attention to concepts of security soft wares. There should be consideration of issues of security in a technology of databases. There should be regular checks on messages sent to address the problem of unmonitored messages as hacker groups send warnings before they commit an attack. Monitoring public declarations by hacker groups in the event of planning attacks through twitter and other social sites. For the purposes of limitations on damages in the event of attacks, the following should be taken into considerations as possible solutions. Looking into politically motivated attacks since the presence of intrusion detection systems give prior warnings of impending attacks. There are vulnerabilities in the installation of exploit kits on servers which result in malware infections. The following tips on communication channels are also admissible; Partitioning and stoppage of infected systems to help in the prevention of more unwanted transmission of data. Preservation of the existing infection status. This include: Analysis of the contents of the web and files of the operating systems. Analysis of database and firewall access logs The creation of clear analysis of data copied illegally with a view of obtaining attack dimensions. Conclusion In conclusion, it is evident from the case study analysis of PeopleSharz Company on the importance of ensuring there is a proper application that is well protected. From the explanations given, this helps in protecting customers and employees from experiencing problems in finance and private information security. It is also prudent for the government and industries to develop and implement rules and regulations that govern against hacking attacks. The nature of hacking activities impacts on organizations such as damage of reputations calls for the urgent need for companies to adopt better mechanisms to help in the safeguarding of their interests. Therefore it is important in having a modern and well-designed web server that takes into account the important details of security measures. Bibliography Kannan, Karthik, Mohammad S. Rahman, and Mohit Tawarmalani. "Economic and policy implications of restricted patch distribution."Management Science(2016). Patel, Savan K., V. R? Rathod, and Jigna B. Prajapati. "Comparative analysis of web security in open source content management system." InIntelligent Systems and Signal Processing (ISSP), 2013 International Conference on, pp. 344-349. IEEE, 2013. Shema, Mike.Hacking web apps: detecting and preventing web application security problems. Newnes, 2012.