Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Security | 6 |
| Internet | 6 |
| Technology | 6 |
| Coding | 4 |
| Computer Science | 2 |
| Computer Software | 2 |
| Mathematics | 2 |
| Networks | 2 |
| Programming | 2 |
| Web Sites | 2 |
| Benchmarking | 1 |
| More ▼ | |
Source
| Educational Technology &… | 1 |
| IEEE Transactions on Education | 1 |
| Mathematics Teacher | 1 |
| Online Submission | 1 |
| ProQuest LLC | 1 |
| Science Teacher | 1 |
Author
| Bachman, Dale J. | 1 |
| Brown, Ezra A. | 1 |
| Chen, Li-Chiou | 1 |
| Dixit, R. K. | 1 |
| Jung, I. Y. | 1 |
| Kang, Hun Jeong | 1 |
| Norton, Anderson H. | 1 |
| Sullivan, Megan | 1 |
| Tao, Lixin | 1 |
| Yeom, H. Y. | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 4 |
| Collected Works - Serial | 1 |
| Dissertations/Theses -… | 1 |
Education Level
| Higher Education | 2 |
| High Schools | 1 |
| Middle Schools | 1 |
| Postsecondary Education | 1 |
Audience
| Teachers | 1 |
Location
| New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kang, Hun Jeong – ProQuest LLC, 2010
With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…
Descriptors: Efficiency, Internet, Information Services, Technology
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Jung, I. Y.; Yeom, H. Y. – IEEE Transactions on Education, 2009
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
Descriptors: Virtual Classrooms, Internet, Computer Security, Computer Uses in Education
Peer reviewedSullivan, Megan – Science Teacher, 2005
For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…
Descriptors: Information Skills, Programming, Internet, Computer Security
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software

Direct link
