NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Havenga, Marietjie; Drevin, Lynette – International Association for Development of the Information Society, 2020
Although postgraduate students are required to be self-directed, this is not always the case. The aims of this study were twofold. Firstly, we investigated whether the use of problem-based projects supported students in implementing different cryptography algorithms as part of a group assignment. Secondly, we determined to which extent the use of…
Descriptors: Problem Based Learning, Independent Study, Graduate Students, Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Desai, Niranjan; Stefanek, George – American Journal of Engineering Education, 2017
Student access to the Internet has made it much easier for students to find solutions to traditional homework problems online and thereby has made this traditional assessment method of monitoring student progress and gauging the assimilation of knowledge in engineering and technology courses less reliable. This paper presents an in-class,…
Descriptors: Academic Achievement, Homework, Technology, Tests
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jafar, Musa; Babb, Jeffry – Information Systems Education Journal, 2012
In this paper we present an artifacts-based approach to teaching a senior level Object-Oriented Analysis and Design course. Regardless of the systems development methodology and process model, and in order to facilitate communication across the business modeling, analysis, design, construction and deployment disciplines, we focus on (1) the…
Descriptors: Data Analysis, Design, Systems Development, Models
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Belon, Barbara; Wright, Marie – 2002
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
Descriptors: College Curriculum, College Instruction, Community Colleges, Computer Science
Gardner, John – Technological Horizons in Education, 1989
Describes and explains three varieties of information technology (IT): academic IT, vocational IT, and cross-curricular IT. Discusses teacher education and the use of IT. Provides recent trends in IT development in education. (MVL)
Descriptors: Academic Education, Computer Oriented Programs, Computer Science Education, Computer Uses in Education
Illinois State Univ., Normal. – 1987
This guide, which is one in the "Exploration" series of curriculum guides intended to assist junior high and middle school industrial educators in helping their students explore diverse industrial situations and technologies used in industry, deals with exploring computer technology. The following topics are covered in the individual…
Descriptors: Behavioral Objectives, Computer Literacy, Computer Oriented Programs, Computer Science