NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Vildan Yalçin; Hasan Gökçe; Oguzhan Nacaroglu – Research in Pedagogy, 2024
This study aims to examine science teachers' views and concerns about artificial intelligence (AI). Phenomenology design, one of the qualitative research method designs, was used in the study. The study group consisted of five science teachers, one doctoral and four master's degree graduates. Semi-structured interview was preferred as a data…
Descriptors: Science Teachers, Teacher Attitudes, Anxiety, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kaban, Abdullatif – Athens Journal of Education, 2021
Do we care about the security on the internet environment the way we do in the daily life safety of our children? In order to answer this question, this study aims to reveal what kind of education is provided at school about using secure internet. In accordance with this purpose, Information Technologies and Software Course textbooks at primary…
Descriptors: Internet, Information Security, Information Technology, Textbooks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dalal, Amy Csizmar; Oliver, Emily – Journal of Higher Education Outreach and Engagement, 2022
We present a case study of a multi-year, academic civic engagement (ACE) collaboration in a computer science capstone course. ACE projects in computer science provide an avenue for students to apply software development concepts to real-world projects with actual clients, and can offer meaningful engagement with ethical issues. The typical…
Descriptors: Case Studies, Computer Science Education, Capstone Experiences, Outcomes of Education
An, Ho – ProQuest LLC, 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Descriptors: Confidentiality, Information Security, Resource Allocation, Computer System Design
OECD Publishing, 2014
The Programme for International Assessment of Adult Competencies (PIAAC) will establish technical standards and guidelines to ensure that the survey design and implementation processes of PIAAC yield high-quality and internationally comparable data. This document provides a revised version of the technical standards and guidelines originally…
Descriptors: Adults, International Assessment, Adult Literacy, Competence