Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Computer Software | 3 |
Computer System Design | 2 |
Information Technology | 2 |
Privacy | 2 |
Programming | 2 |
Active Learning | 1 |
Case Method (Teaching… | 1 |
Case Studies | 1 |
Class Activities | 1 |
College Instruction | 1 |
More ▼ |
Source
Interactive Technology and… | 3 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lorenz, Anja; Borcea-Pfitzmann, Katrin – Interactive Technology and Smart Education, 2010
Purpose: Facing the dilemma between collaboration and privacy is a continual challenge for users. In this setting, the purpose of this paper is to discuss issues of a highly flexible role management integrated in a privacy-enhanced collaborative environment (PECE). Design/methodology/approach: The general framework was provided by former findings…
Descriptors: Cooperation, Interaction, Data, Role
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Weippl, Edgar R.; Tjoa, A Min – Interactive Technology and Smart Education, 2005
Privacy is a requirement that has not received the required attention in most e-learning platforms. Based on the results of a survey we identified weaknesses of e-learning platforms and describe improvements we made in Moodle as a proof-of-concept.
Descriptors: Electronic Learning, Privacy, Improvement, Computer Security