ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Using Automated Prompts for Student Reflection on Computer Security Concepts
Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education
◽
10.1145/3304221.3319731
◽
2019
◽
Author(s):
Hui Chen
◽
Agnieszka Ciborowska
◽
Kostadin Damevski
Keyword(s):
Computer Security
◽
Student Reflection
Download Full-text
Related Documents
Cited By
References
Tracking and Managing Student Reflection on their Behavior: Lessons from a Collaborative Effort to Modernize the "Thinksheet"
PsycEXTRA Dataset
◽
10.1037/e524952015-003
◽
2015
◽
Author(s):
Charlene Mangi
◽
Allison McFarland
Keyword(s):
Collaborative Effort
◽
Student Reflection
Download Full-text
Increasing Student Reflection on How Their Own Development Connects With Young Adulthood Theories in a Service Learning Project
PsycEXTRA Dataset
◽
10.1037/e566842012-642
◽
2010
◽
Author(s):
Sherry Schnake
Keyword(s):
Service Learning
◽
Young Adulthood
◽
Student Reflection
Download Full-text
Red team performance for improved computer security
PsycEXTRA Dataset
◽
10.1037/e577102012-010
◽
2004
◽
Author(s):
Sara Kraemer
◽
Pascale Carayon
◽
Ruth Duggan
Keyword(s):
Computer Security
◽
Team Performance
Download Full-text
I Downloaded What?: An Examination of Computer Security Decisions
PsycEXTRA Dataset
◽
10.1037/e577712012-021
◽
2006
◽
Author(s):
Jefferson B. Hardee
◽
Christopher B. Mayhorn
◽
Ryan West
Keyword(s):
Computer Security
Download Full-text
2nd Aerospace Computer Security Conference
10.2514/mats86
◽
1986
◽
Keyword(s):
Computer Security
Download Full-text
Communications and Information: Computer Security
10.21236/ada405011
◽
2001
◽
Author(s):
SECRETARY OF THE AIR FORCE WASHINGTON DC
Keyword(s):
Computer Security
Download Full-text
The Reference Monitor Concept as a Unifying Principle in Computer Security Education
10.21236/ada423529
◽
1999
◽
Cited By ~ 7
Author(s):
Cynthia E. Irvine
Keyword(s):
Computer Security
◽
Security Education
Download Full-text
The Specification and Modeling of Computer Security
10.21236/ada462368
◽
1990
◽
Cited By ~ 5
Author(s):
John McLean
Keyword(s):
Computer Security
Download Full-text
The Handbook for the Computer Security Certification of Trusted Systems
10.21236/ada462362
◽
1992
◽
Cited By ~ 1
Author(s):
Judith N. Froscher
◽
Jr Payne
◽
Charles N.
Keyword(s):
Computer Security
Download Full-text
An Analysis of the Computer Security Ramifications of Weakened Asymmetric Cryptographic Algorithms
10.21236/ada562021
◽
2012
◽
Author(s):
Eric R. Bixby
Keyword(s):
Computer Security
◽
Cryptographic Algorithms
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close