NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Peer reviewed Peer reviewed
Direct linkDirect link
Greller, Wolfgang; Drachsler, Hendrik – Educational Technology & Society, 2012
With the increase in available educational data, it is expected that Learning Analytics will become a powerful means to inform and support learners, teachers and their institutions in better understanding and predicting personal learning needs and performance. However, the processes and requirements behind the beneficial application of Learning…
Descriptors: Foreign Countries, Computer Uses in Education, Ethics, Best Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Neumann, Marco; O'Murchu, Ina; Breslin, John; Decker, Stefan; Hogan, Deirdre; MacDonaill, Ciaran – Journal of European Industrial Training, 2005
Purpose: The motivation for this investigation is to apply social networking features to a semantic network portal, which supports the efforts in enterprise training units to up-skill the employee in the company, and facilitates the creation and reuse of knowledge in online communities. Design/methodology/approach: The paper provides an overview…
Descriptors: Foreign Countries, Knowledge Management, Semantics, Social Networks