NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Peer reviewed Peer reviewed
Nackerud, Shane A. – Information Technology and Libraries, 1998
Describes CGI (Common Gateway Interface) scripts that are available on the Web and explains how librarians can use them to make Web pages more interactive. Topics include CGI security; Perl scripts; UNIX; and HTML. (LRW)
Descriptors: Computer Interfaces, Computer Security, Gateway Systems, Library Automation
Peer reviewed Peer reviewed
Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models
Gordon, Barbara – Educom Review, 1996
Java is an object-oriented programming language developed by Sun Microsystems; its benefits include platform independence, security, and interactivity. Within the college community, Java is being used in programming courses, collaborative technology research projects, computer graphics instruction, and distance education. (AEF)
Descriptors: Computer Graphics, Computer Science Education, Computer Security, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology