Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 6 |
Internet | 6 |
Technology | 6 |
Coding | 4 |
Computer Science | 2 |
Computer Software | 2 |
Mathematics | 2 |
Networks | 2 |
Programming | 2 |
Web Sites | 2 |
Benchmarking | 1 |
More ▼ |
Source
Educational Technology &… | 1 |
IEEE Transactions on Education | 1 |
Mathematics Teacher | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Science Teacher | 1 |
Author
Bachman, Dale J. | 1 |
Brown, Ezra A. | 1 |
Chen, Li-Chiou | 1 |
Dixit, R. K. | 1 |
Jung, I. Y. | 1 |
Kang, Hun Jeong | 1 |
Norton, Anderson H. | 1 |
Sullivan, Megan | 1 |
Tao, Lixin | 1 |
Yeom, H. Y. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 2 |
High Schools | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Audience
Teachers | 1 |
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kang, Hun Jeong – ProQuest LLC, 2010
With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…
Descriptors: Efficiency, Internet, Information Services, Technology
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Jung, I. Y.; Yeom, H. Y. – IEEE Transactions on Education, 2009
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
Descriptors: Virtual Classrooms, Internet, Computer Security, Computer Uses in Education
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software

Sullivan, Megan – Science Teacher, 2005
For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…
Descriptors: Information Skills, Programming, Internet, Computer Security