NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Skov, Mikael Brasholt; Stage, Jan – Behaviour & Information Technology, 2012
Many efforts to improve the interplay between usability evaluation and software development rely either on better methods for conducting usability evaluations or on better formats for presenting evaluation results in ways that are useful for software designers and developers. Both of these approaches depend on a complete division of work between…
Descriptors: Foreign Countries, Introductory Courses, Evaluators, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Greitzer, Frank L.; Kuchar, Olga Anna; Huston, Kristy – Journal on Educational Resources in Computing, 2007
Serious games use entertainment principles, creativity, and technology to meet government or corporate training objectives, but these principles alone will not guarantee that the intended learning will occur. To be effective, serious games must incorporate sound cognitive, learning, and pedagogical principles into their design and structure. In…
Descriptors: Training Objectives, Educational Technology, Educational Principles, Design Requirements