Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 4 |
Models | 4 |
Information Technology | 3 |
Active Learning | 1 |
Check Lists | 1 |
Classification | 1 |
College Curriculum | 1 |
College Programs | 1 |
Comparative Analysis | 1 |
Comparative Education | 1 |
Computer Networks | 1 |
More ▼ |
Author
Abdollah, Faizal Mohd | 1 |
Ciric, Vladimir | 1 |
Dhillon, Harpal S. | 1 |
Dhillon, Manpreet | 1 |
Hentea, Mariana | 1 |
Mahalingam, Sheila | 1 |
Milentijevic, Ivan | 1 |
Sahib, Shahrin | 1 |
Vojinovic, Oliver | 1 |
Publication Type
Reports - Evaluative | 4 |
Journal Articles | 2 |
Information Analyses | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
Descriptors: Electronic Learning, Computer Security, Reliability, Trust (Psychology)
Milentijevic, Ivan; Ciric, Vladimir; Vojinovic, Oliver – Computers & Education, 2008
This paper deals with the development of a generalized model for version control systems application as a support in a range of project-based learning methods. The model is given as UML sequence diagram and described in detail. The proposed model encompasses a wide range of different project-based learning approaches by assigning a supervisory…
Descriptors: Student Projects, Cooperation, Active Learning, Models
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software