Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 8 |
Descriptor
Source
| ProQuest LLC | 5 |
| Campus-Wide Information… | 1 |
| Educational Technology &… | 1 |
| Informatics in Education | 1 |
| Interactive Technology and… | 1 |
Author
| Amin, Rohan Mahesh | 1 |
| Campbell, Jackie | 1 |
| Chen, Li-Chiou | 1 |
| Drasutis, Sigitas | 1 |
| Malaika, Majid A. | 1 |
| Motekaityte, Vida | 1 |
| Nitinawarat, Sirin | 1 |
| Noreika, Algirdas | 1 |
| Sandvig, J. Christopher | 1 |
| Shaw, Bilal A. | 1 |
| Tao, Lixin | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 5 |
| Journal Articles | 4 |
| Reports - Descriptive | 2 |
| Reports - Evaluative | 2 |
| Legal/Legislative/Regulatory… | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 2 |
Audience
| Teachers | 1 |
Location
| New York | 1 |
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Malaika, Majid A. – ProQuest LLC, 2011
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
Descriptors: Internet, Programming, Automation, Methods
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Drasutis, Sigitas; Motekaityte, Vida; Noreika, Algirdas – Informatics in Education, 2010
The Internet has recently encouraged the society to convert almost all its needs to electronic resources such as e-libraries, e-cultures, e-entertainment as well as e-learning, which has become a radical idea to increase the effectiveness of learning services in most schools, colleges and universities. E-learning can not be completely featured and…
Descriptors: Computer Science Education, Computer System Design, Computer Software Evaluation, Programming
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Willemssen, Joel C. – 1999
This document provides testimony on the U.S. Department of Education's efforts to ensure that its computer systems supporting critical student financial aid activities will be able to process information reliably through the turn of the century. After providing some background information, the statement recaps prior findings and the actions that…
Descriptors: Computer Security, Computer Software, Computer System Design, Federal Government
Sandvig, J. Christopher – Campus-Wide Information Systems, 2004
The growth of the Internet has greatly increased the demand for server-side programming courses at colleges and universities. Students enrolled in such courses must be provided with server-based accounts that support the technologies that they are learning. The process of creating, managing and removing large numbers of student server accounts is…
Descriptors: Internet, Courseware, Computer System Design, Computer Software Reviews

Direct link
Peer reviewed
