NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
Ezeugo, Ernest; Klein, Carrie; Whitfield, Christina – State Higher Education Executive Officers, 2021
State postsecondary data systems contain a wealth of information--including detailed records about individuals--that allow states to analyze and improve their postsecondary education systems. The entities that maintain these systems operate in a context of concern about the privacy and security of educational records. They have both an interest in…
Descriptors: Privacy, Information Security, Information Systems, Postsecondary Education
Whitfield, Christina; Armstrong, John; Weeden, Dustin – State Higher Education Executive Officers, 2019
Since 2010, the State Higher Education Executive Officers Association (SHEEO) has periodically administered the "Strong Foundations" survey, which documents the content, structure, and effective use of state postsecondary student unit record systems (PSURSs). This report highlights the results of the fourth administration of the survey,…
Descriptors: Postsecondary Education, Information Systems, Student Records, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Armstrong, John; Whitfield, Christina – State Higher Education Executive Officers, 2016
This report addresses two key questions about postsecondary student unit record data systems (PSURSs): (1) What data are collected by various parties; and (2) how do these entities use the data to inform policy decisions? This 2016 report is both a follow-up and a redesign of two previous "Strong Foundations" reports by SHEEO (2010 and…
Descriptors: Postsecondary Education, Information Systems, Student Records, Data Collection