Rewrite the article in (which i included below) 1000 to 1500 words. Please read the requirement document which i

Rewrite the article in (which i included below) 1000 to 1500 words. Please read the requirement document which i included below. Also I have attached the article which you need to rewrite in your own words. if you want to cite from outside, make sure cite it. Note. Requirements 1. IDENTIFYING YOUR NEW AUDIENCE AND GENRE)2. ANALYZING YOUR TARGET AUDIENCE AND GENRE

Discipline Project Assignment – Spring 2019
ESSAY 1: Discipline Project
Translating a Scholarly Article in Your Field of Study for a Public Audience
Adapted from ​An Insider’s Guide to Academic Writing, b
​ y Miller-Cochran, Stamper, and Cochran.
Bedford/St. Martin’s P, 2016.
The goal of this assignment is to translate a scholarly article written for your field of
study for a public audience.
There are three parts to this assignment:
• Locate, read, and analyze a ​recently​ published scholarly article in your academic
discipline that addresses a topic of interest to you and the general public.
• “Translate” (rewrite) the article in a new genre appropriate to a public audience.
• Write a reflective analysis about the choices you made as you wrote your
After completing this assignment, you should be able to:
• Analyze the rhetorical features of scholarly writing in your discipline and public
• Identify the conventions of various genres of scholarly, professional, and public
• Write with an awareness of how the rhetorical situation and rhetorical context
influence the structure, language, and reference conventions (SLRs) writers use to
achieve their purpose in writing to specific audiences.
This assignment counts for 20% of your final grade. The final project should range
from 1,000 to 1,500 words (including the Reflective Analysis).
After you choose your article, read it carefully so that you understand what it conveys.
Next, identify a new audience and genre for your translation of the article. The objective
is to shift the audience from an academic one to a public one.
Discipline Project Assignment – Spring 2019
You may choose to write a magazine article to a general audience of people interested
in your field, a newspaper article that reports research findings, or a press release like
the student sample included in this lesson.
Notice that once you change audiences, then the form in which you report will need to
shift as well. The genre you produce will be contingent on the audience you’re targeting
and the rhetorical context (magazine article, newspaper article, press release, etc.).
Closely analyze an example or two of the kind of genre you’re attempting to create and
consider how those genre examples fulfill the expectations of the target audience. Your
project will be assessed according to its ability to reproduce those genre expectations, so
you will need to explain, in detail, the rhetorical changes and other choices you had to
make in the construction of your piece. Be sure that you’re able to explain the rhetorical
choices you make in writing your translation. Consider all four elements of the
rhetorical context: author, audience, topic, purpose.
At this point, you’re ready to begin constructing or translating the article into the new
genre. The genre you’re producing could take any number of forms. As such, the form
structure, and development of your ideas are contingent on the genre of public
reporting you’re attempting to construct. If you’re constructing a magazine article, for
example, then the article you produce should really look like one that would appear in
a magazine. Try to mirror how the genre would appear in a real situation.
Once your translation is complete, compose a reflective analysis (at least 250 words). As
part of your analysis, consider the rhetorical choices you made as you constructed your
translation. Offer a rationale for each of your decisions that connects the features of
your transition to your larger rhetorical context. For example, if you had to translate the
title of the scholarly article for a public audience, explain why your new title is the most
appropriate on for your public audience.
Failure to include a reflective analysis results in an automatic 10-point deduction in
Discipline Project Assignment – Spring 2019
The Discipline Project does not require you to incorporate secondary sources, but if you
feel it is appropriate to your reader and the genre you chose, then do so. Just make sure
to include a references page at the end of the essay.
It is more important to think about how you will incorporate evidence from the
scholarly article you are translating. Public audiences appreciate a quotation or two, but
you will find that you need to rely more heavily on summary and paraphrase in
translating the article for a general reader. Summary and paraphrase require citations.
CITE ​all information​ that does not originate with you.
● Use the format for the genre you chose that is appropriate for your public
● Use the documentation style and manuscript format for your academic discipline
(APA or MLA).
The first draft for this assignment is due Thursday 2/21. The final draft is due Thursday 3/7.
This adapted assignment, developed by the George Mason Composition Program, is licensed
under a C
​ reative Commons Attribution-NonCommercial 4.0 International​ (CC BY-NC 4.)
TELKOMNIKA, Vol.14, No.3A, September 2016, pp. 333~337
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v14i3A.4417

Mobile Internet Information Security Analysis and
Yongbin Zhua, Li Yan, Junsheng Li*b
Computer Science of Engineering College, Honghe University, Mengzi, Yunnan, 661199, P. R. China
*Corresponding author, e-mail: abel.chu@foxmail.coma, 122143275@qq.comb
The influence of mobile Internet on people’s daily life is increasing day by day. In the constantly
changing people’s lives, at the same time, the mobile Internet information security is also facing a huge
challenge, and concerned by more and more information security practitioners. According to the
characteristics of the mobile Internet, this paper analyzes the factors that affect the security of the mobile
Internet, and expounds the current security situation of the mobile Internet.
Keywords: mobile internet, information security, intelligent terminal, measures
Copyright © 2016 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Mobile Internet is a revolutionary advance in technology; it not only changed the way of
communication between people, but also brought a new revolution to many industries and
business [1]. Mobile internet terminals have features of mobility and personalization different to
internet terminals. With the rapid development of mobile broadband technology and services, as
well as the increasing of the user, the global mobile Internet market is developing with each
passing day [2]. The mobile intelligent terminal is becoming more intelligent and more open, and
its property is closer to the user’s demand. These mobile intelligent terminal devices with
Internet access, Office, telecommunications, gaming, entertainment and other features, are
gradually developing into a user’s counseling centers, office centers, trade centers and
entertainment centers. As more and more users prefer to use mobile intelligent terminal devices
to access the network, and enjoy personalized services brought by mobile Internet, while
cybercriminals also eyeing the huge gains in mobile Internet, mobile Internet and intelligent
terminals are also becoming a new target of cyber attacks [3]. In addition to the risk of economic
losses and leakage of privacy, mobile Internet users also faced with the threat of communication
barriers. Furthermore, mobile Internet also has many security problems; hundreds of millions of
users have been plagued by a variety of security issues.
2. Mobile Internet Features and Security Risks
2.1. Mobile Internet Features
Mobile Internet has the features of convenience, personalization, privacy, integration
and IntelliSense and other characteristics. With different to traditional Internet access methods,
the mobile Internet can be accessed through mobile communication networks anywhere and
anytime, and can keep the real-time online state [4]. With the development of intelligent terminal
devices become smaller, increasing capacity, processing power is growing, to a great extent to
meet the convenience needs of people to access the network. This convenience has spawned a
huge market for location-based services, such as mobile electronic maps, taxi software, etc. In
the access terminal, network and APP applications, mobile Internet will better reflect the
individual needs of users. Individual terminals and network personalization combined with each
other to make a personalized effect great release [5]. Integration of mobile voice services and
mobile Internet services has led to business integration, and features more integrated, smart
phones are becoming the only electronic equipment to carry. Future mobile devices will have
Received March 21, 2016; Revised July 26, 2016; Accepted August 5, 2016

ISSN: 1693-6930
intelligent perception, for example, the future watch can detect your blood pressure and heart
rate, and before the physical health problems will be able to remind you of timely treatment.
2.2. Mobile Internet Information Security Risks
With the popularity of smart phones, different manufacturers provide different systems;
the wide variety terminal types increase the security flaw possibility. Because of the close
relationship between the mobile terminal and its user, personal information is more valuable,
and the continuous expansion of the business functions, such as office and payment, carry a
huge business value, so the threat of intelligent terminal users is more serious than PC users.
From the intelligent terminal, the security issues include malicious deductions, tampering
destruction, loss of privacy, identity theft and mobile phone viruses. From an operational
platform, the security issues include denial of service and information theft, etc. From a service
provider perspective, the problems include adverse information dissemination, unsafe and
malicious chargeback service [6]. Therefore, the characteristics of the mobile Internet determine
its network will face more serious security threat than traditional.
3. Mobile Internet Security Status
3.1. The Security Threat to the Development of Intelligent Terminal
The gradual popularization of 4G high speed mobile network has brought a broad space
for development. The original social networks, search applications, micro blogging, micro letter,
LBS (mobile maps and route optimization) and so will be more popular. The original functions
such as online video viewing and video chat can not be fluent in the 3G mobile phone network
in 4G high-speed network will be used by more people. As the mobile intelligent terminal is
becoming more and more intelligent and opening, the user terminal properties are more close to
individual. Expanding office, payment and other business functions carries great commercial
value, so that the mobile terminal more vulnerable to attack. A large number of users and users
lack security awareness, so that the mobile network is facing serious security threats [7].
3.2. Network IP Brings New Security Challenges
Network infrastructure as an important mobile Internet, hosting a large number of
application data, operators will increase the confidentiality of communications services, integrity
and availability of building a more rapid, reliable and intelligent pipeline. With the increase of
data traffic carried 4G, IP-based underlying network inevitable. IP-based telecommunications
network makes over a closed network to an open Internet, and also the various security threats
and attacks, the vulnerability of the Internet and other telecommunications networks is
introduced, greatly increasing the security risks (such as anonymous telephone calls flood, etc).
LTE has become mobile Internet IP pipeline, but the safety of LTE/SAE is still issues; while
WLAN is gradually as mobile internet primary access mode, the network security problems are
still difficult to solve; IPv4 address was exhausted in 2011.2, address safety planning, safety
supervision and other issues of popularized IPv6 need attention [8].
3.3. Security Threats Faced by Business Diversification
The rapid development of communication services, from traditional voice services to
data and media development, diversified business is facing a variety of security threats [9]. As
bad information service information for dissemination of sensitive information leakage, the
Trojan back door for business support, Web attacks, the business model for business abuse,
malicious ordering, operators will assume more responsibility for information security, the need
to increase content security, safety, security building business processes, safeguard green,
convenient and secure business applications.
3.4. Security Threats Caused by Platform Diverse
Cloud computing and the Internet of Things bring new security risks. Mobile Internet
era, business services side gradually evolve to cloud computing platform, features of cloud
computing virtualization, multi-tenancy, dynamic scheduling bring a huge change to the
business model, but also introduce new security issues for mobile Internet applications [10].
Things mode proposed new security requirements [11]: 1) Distributed terminal make centralized
TELKOMNIKA Vol. 14, No. 3A, September 2016 : 333 – 337
ISSN: 1693-6930

protection mode may not be available, such as traditional firewall centralized protection can not
be achieved; 2) M2M terminals (such as smart meters, fire alarm, room monitor, etc.) in IOT are
not mobile or mobile within a fixed range, illegal mobile nodes must be monitored; 3) Things will
contain a large number of private data, such as personal identity, location information, water
and electricity data, transmission of private information requires effective protection; 4)
Equipment in Things become the focus of network communications, equipments need to focus
on their own safety issues, such as certification for device identification.
3.5. Users Lack Security Awareness
DCCI released “China Mobile Security Status Survey” data: 94.9% of mobile phone
users lack a sense of security, 45.4% of mobile phone users do not have to install security
software, and more than half of mobile users are lack of mobile security protection [12]. The loss
of the phone is 15 times as much as a laptop computer. The value of the consumer’s data
assets stored in phones is huge, but there are more than 1/3 of the information is lack of
protection; 52% of consumers use mobile phones as mobile wallet; therefore, how to carry out
the safe shopping through mobile devices becomes more and more important. More than half of
smart phone users are not using any password protection to prevent unauthorized access to
their devices. Mobile phone threat is becoming more and more complex; users need to enhance
security awareness.
4. Results and Discussion
In view of these above security situations, it is recommended to take hierarchical and
sub domain ideas for the mobile Internet security, respectively, from the mobile terminal
security, core network security, application security and security assessment of four levels to
take measures.
4.1. Improve the Security of Terminal Equipment
Terminal security is a problem that must be solved in the development of mobile
Internet, and is also the most concerned by users. Mobile internet terminal securities include the
traditional terminal protection means, mobile terminal security management, terminal access
control and other [13].
(1) Strengthen the management of mobile intelligent terminal access. The mobile
communication terminal manufacturers in the network license application, the mobile intelligent
terminal equipment must first comply with the certification requirements, and must be
responsible for the safety and legitimacy of application software pre-installed. (2) It needs to
improve the mobile Internet malware monitoring and disposal capacity, to build and improve the
relevant technology platforms. Mobile operators should have the ability and liability to deal
covering the monitoring of the enterprise network, and to promote users about the intelligent
terminal safety knowledge, to encourage users to install security software, timely to upgrade the
operating system and security configuration [14, 15].
4.2. Strengthen the Core Integrated Network Security
Core integrated network security is the central link of the entire mobile Internet for safe
operation. Mobile Internet is composed of access network, IP bearer network and Internet. We
can learn from the experience of traditional Internet and mobile Internet features into account,
from the network equipment security, network security, access network security, network
security, security and information security, information security, information security these levels
to study its security measures to further strengthen safety identification in the key links of
information identification, filtering and blocking. For example, using the better recognition and
disseminate ability of the Internet to enhance the safety monitoring of some blind spots; in the
process of multi system access to users, a unified security management policy must be
provided; in new business development, inspection and monitoring of new business must be
carried out, so that new business security technology and existing basic standards can be
Mobile Internet Information Security Analysis and Countermeasures (Junsheng Li)

ISSN: 1693-6930
4.3 Mobile Internet Security requires more Effective Integrated Management
Maintenance of mobile Internet security should be made a global perspective complete
integrated solution, which needs users, mobile operators, network security vendors, handset
manufacturers, software developers and Internet information providers to put forward higher
requirements, at the same time, government regulators need to improve the corresponding
regulatory system, strengthen the construction of relevant laws and regulations.
(1) Handset users need to further improve the safety awareness and the knowledge of
network security to identify problem sites, malicious software and various network frauds. (2)
Operators, network security providers, handset manufacturers, software developers need to
build a scientific, comprehensive security system from starting construction of the mobile
Internet as a whole at all levels of network security vendors, to focus on the development of
mobile Internet viruses and malicious software, to take the work in a timely manner of network
security, mobile devices and operating platforms. (3) Network Information providers should
further improve the information content of the pre-trial management mechanism, strengthen the
monitoring means of information dissemination of content, blocking information from a source of
insecurity spread. (4) Government regulatory departments should establish and improve the
mobile Internet-related regulatory mechanisms to accelerate relevant laws and regulations,
strengthen law enforcement, and severely punish criminal conduct mobile Internet network, at
the same time, government regulators should carry out the mobile Internet-related safety
knowledge publicity and education activities to enhance network security awareness of the
whole society.
5. Conclusion
The rapid development of the Internet is often ahead of legislation, when the problem
has emerged, but the corresponding law does not develop, the network security is a great
threat. Internet industry itself must strengthen the moral construction. Information provided by
individuals should be timely reviewed to avoid some of the harm to society content. Some
network practitioners for their own interests wantonly spread malicious information contained
pornographic, reactionary and cults like. This requires network providers for further screening
and filtering against illegal information to ensure cyberspace content consistent with national
laws and regulations.
This paper belongs to projects of the “Basic Applications Research in Yunnan”
(No.2013fz127) and the “Yunnan Education Fund for Scientific Research” (No.2014C136Y).
Sun ZF. Analysis on Development of Mobile Internet Technology and Security. Telecommunications
Science. 2011; (S1): 98-101.
T Sutikno, D Stiawan, IMI Subroto. Fortifying Big Data infrastructures to Face Security and Privacy
Issues. TELKOMNIKA (Telecommunication Computing Electronics and Control). 2014; 12(4): 751752.
Wu Z, Wei P, Coghill GM. An integrative top-down and bottom-up qualitative model construction
framework for exploration of biochemical systems. Soft Computing. 2015; 19(6): 1595-1610.
Corbier C, Badaoui ME, Ugalde HMR. Huberian Approach for Reduced Order ARMA Modeling of
Neurodegenerative Disorder Signal. Signal Processing. 2015, 113: 273-284.
De NS, Leoncini X. Critical behavior of the XY-rotor model on regular and small-world networks.
Physical Review E Statistical Nonlinear & Soft Matter Physics. 2013; 88(1-1): 2252-2279.
Wu Z, Wei P, Coghill GM. An integrative top-down and bottom-up qualitative model construction
framework for exploration of biochemical systems. Soft Computing. 2015; 19(6): 1595-1610.
Susanto BM. Naïve Bayes Decision Tree Hybrid Approach for Intrusion Detection System. Bulletin of
Electrical Engineering and Informatics. 2013; 2(3): 225-232.
Saxena S. Extension to HiRLoc Algorithm for Localization Error Computation in Wireless Sensor
Networks. Indonesian Journal of Electrical Engineering and Informatics (IJEEI). 2013; 1(4): 119-126.
Li YH, Wang Z, Chen JY. Mobile Internet security threat and strategy research. Mobile Internet
security threats Engineering Technology. 2013; 10.
TELKOMNIKA Vol. 14, No. 3A, September 2016 : 333 – 337
ISSN: 1693-6930

[10] Erturk E. Two trends in mobile malware: financial motives and transitioning from static to dynamic
analysis. International journal of intelligent computing research. 2012; 3(3/4): 325-329.
[11] Chen SY. Research on the security technology of mobile Internet. Information security and
communication security. 2010; 8.
[12] Huo Z. Cloud Computing Oriented privacy preserving query processing technology. Computer
science and exploration. 2012; 5.
[13] Dadkhah M, Sutikno T. Phishing or hijacking? Forgers hijacked DU journal by copying content of
another authenticate journal. Indonesian Journal of Electrical Engineering and Informatics (IJEEI).
2015; 3(3): 119-120.
[14] Liu ZP, Zhang SH. Clustering method of hot topic of network public opinion. Mini-micro Systems.
2013; 3.
[15] Wang J. Information security system construction of China Mobile Internet base. Telecom
Engineering Technics and Standardization. 2011; 24(10): 7-10.
Mobile Internet Information Security Analysis and Countermeasures (Junsheng Li)
Copyright of Telkomnika is the property of Department of Electrical Engineering, Ahmad
Dahlan University and its content may not be copied or emailed to multiple sites or posted to
a listserv without the copyright holder’s express written permission. However, users may
print, download, or email articles for individual use.

Purchase answer to see full