Sciweavers

41 search results - page 2 / 9
» Towards Changes in Information Security Education
Sort
View
SIGITE
2004
ACM
14 years 1 months ago
How information technology professionals keep from being outsourced or offshored
This paper introduces the concept of the “vendible line” partitioning jobs in a company into those that are likely to be lost to outsourcing (onshore or offshore) and those th...
Ron Fulbright, Richard L. Routh
ISSA
2008
13 years 9 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 2 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
IJVR
2008
118views more  IJVR 2008»
13 years 8 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
SIGCSE
1994
ACM
172views Education» more  SIGCSE 1994»
14 years 5 hour ago
Collaborative learning in an introductory computer science course
An experiment in collaborative learning was conducted in two introductory programming courses at Loyola College in Maryland. Data collected included background information on stud...
Roberta Evans Sabin, Edward P. Sabin