Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 4 |
| Models | 4 |
| Information Technology | 3 |
| Active Learning | 1 |
| Check Lists | 1 |
| Classification | 1 |
| College Curriculum | 1 |
| College Programs | 1 |
| Comparative Analysis | 1 |
| Comparative Education | 1 |
| Computer Networks | 1 |
| More ▼ | |
Author
| Abdollah, Faizal Mohd | 1 |
| Ciric, Vladimir | 1 |
| Dhillon, Harpal S. | 1 |
| Dhillon, Manpreet | 1 |
| Hentea, Mariana | 1 |
| Mahalingam, Sheila | 1 |
| Milentijevic, Ivan | 1 |
| Sahib, Shahrin | 1 |
| Vojinovic, Oliver | 1 |
Publication Type
| Reports - Evaluative | 4 |
| Journal Articles | 2 |
| Information Analyses | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
| Administrators | 1 |
| Media Staff | 1 |
| Practitioners | 1 |
Location
| Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
Descriptors: Electronic Learning, Computer Security, Reliability, Trust (Psychology)
Milentijevic, Ivan; Ciric, Vladimir; Vojinovic, Oliver – Computers & Education, 2008
This paper deals with the development of a generalized model for version control systems application as a support in a range of project-based learning methods. The model is given as UML sequence diagram and described in detail. The proposed model encompasses a wide range of different project-based learning approaches by assigning a supervisory…
Descriptors: Student Projects, Cooperation, Active Learning, Models
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software

Peer reviewed
Direct link
