NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Qleibo, Haider W. – ProQuest LLC, 2009
WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…
Descriptors: Confidentiality, Integrity, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Jokela, Paivi; Karlsudd, Peter – Journal of Information Technology Education, 2007
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Descriptors: Higher Education, Plagiarism, Distance Education, Confidentiality
Peer reviewed Peer reviewed
McLaughlin, Josetta; Pavelka, Deborah; McLaughlin, Gerald – Journal of Education for Business, 2005
A significant trend in higher education evolving from the wide accessibility to the Internet is the availability of an ever-increasing supply of data on Web sites for use by professors, students, and researchers. As this usage by a wider variety of users grows, the ability to judge the integrity of the data, the related findings, and the Web site…
Descriptors: Web Sites, Internet, Evaluation, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Peer reviewed Peer reviewed
Direct linkDirect link
Henning, Marcus – Internet and Higher Education, 2004
In the current information age, there is a growing use of and reliance on the Internet. One area of concern for educators is the communication of information using an electronic questionnaire interface. Therefore, it seems pertinent to look at the issue of dissemination of Internet questionnaire information and the integrity of this process.…
Descriptors: Integrity, Questionnaires, Conflict Resolution, Internet