Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 3 |
| Computer Software | 3 |
| Computer System Design | 2 |
| Information Technology | 2 |
| Privacy | 2 |
| Programming | 2 |
| Active Learning | 1 |
| Case Method (Teaching… | 1 |
| Case Studies | 1 |
| Class Activities | 1 |
| College Instruction | 1 |
| More ▼ | |
Source
| Interactive Technology and… | 3 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lorenz, Anja; Borcea-Pfitzmann, Katrin – Interactive Technology and Smart Education, 2010
Purpose: Facing the dilemma between collaboration and privacy is a continual challenge for users. In this setting, the purpose of this paper is to discuss issues of a highly flexible role management integrated in a privacy-enhanced collaborative environment (PECE). Design/methodology/approach: The general framework was provided by former findings…
Descriptors: Cooperation, Interaction, Data, Role
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Weippl, Edgar R.; Tjoa, A Min – Interactive Technology and Smart Education, 2005
Privacy is a requirement that has not received the required attention in most e-learning platforms. Based on the results of a survey we identified weaknesses of e-learning platforms and describe improvements we made in Moodle as a proof-of-concept.
Descriptors: Electronic Learning, Privacy, Improvement, Computer Security

Peer reviewed
Direct link
