Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Author
Chen, Li-Chiou | 1 |
Clouse, Shawn | 1 |
David P. Bunde | 1 |
John F. Dooley | 1 |
Lawrence, Cameron | 1 |
Looney, Clayton | 1 |
Rossmiller, Zach | 1 |
Tao, Lixin | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Teachers | 3 |
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Rossmiller, Zach; Lawrence, Cameron; Clouse, Shawn; Looney, Clayton – Information Systems Education Journal, 2017
Many entrepreneurs and small business owners lack disaster recovery plans, which minimize business disruptions caused by failures of critical technical systems. Typically, technology is not the main focus for a small business owner, as most of their time is spent focused on business operations. This case study demonstrates that when a business…
Descriptors: Emergency Programs, Crisis Management, Small Businesses, Planning
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education