Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Database Design | 5 |
Database Management Systems | 5 |
Information Security | 5 |
Computer Security | 2 |
Databases | 2 |
Information Management | 2 |
Program Implementation | 2 |
Access to Information | 1 |
Accuracy | 1 |
Animal Husbandry | 1 |
Animals | 1 |
More ▼ |
Source
Data Quality Campaign | 1 |
IEEE Transactions on Learning… | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
Author
Ahluwalia, Madhu V. | 1 |
Alier, Marc | 1 |
Altun, Halis | 1 |
Baker, Elizabeth | 1 |
Bergner, Terry | 1 |
Blackman, Harvey | 1 |
Haddad, Hatem | 1 |
Irwin, Gretchen | 1 |
Kaiiali, Mustafa | 1 |
Ozkaya, Armagan | 1 |
Reinicke, Bryan | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Ahluwalia, Madhu V. – ProQuest LLC, 2011
In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…
Descriptors: Databases, Information Security, Data, Information Retrieval
Irwin, Gretchen; Wessel, Lark; Blackman, Harvey – Journal of Information Systems Education, 2012
This case describes a database redesign project for the United States Department of Agriculture's National Animal Germplasm Program (NAGP). The case provides a valuable context for teaching and practicing database analysis, design, and implementation skills, and can be used as the basis for a semester-long team project. The case demonstrates the…
Descriptors: Course Descriptions, Genetics, Animals, Animal Husbandry
Bergner, Terry; Smith, Nancy J. – Data Quality Campaign, 2007
Imagine if, at the start of the school year, a teacher could have detailed information about the academic history of every student in her or his classroom. This is possible if the teacher can log on to a Web site that provides access to an educational data warehouse. The teacher would see not only several years of state assessment results, but…
Descriptors: Database Design, Database Management Systems, Management Information Systems, State Programs