Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Risks And Responsibilities In Establishing A Wireless Network For An Educational Institution, Leigh Knights, Matt Fonceca, Georgina Mack, Andrew Woodward Dec 2006

Risks And Responsibilities In Establishing A Wireless Network For An Educational Institution, Leigh Knights, Matt Fonceca, Georgina Mack, Andrew Woodward

Australian Information Security Management Conference

A wireless network solution is generally implemented when the bounds of walls of buildings and the constraints of wires need to be broken. Wireless technologies provide the potential for freedom of mobility which is undoubtedly a convenience for organisations in today’s market. The security of a wireless network is crucial for data integrity, especially when the data is not secured by the insulation of wires. While data is being transferred across a wireless network, it is vulnerable. There is no room for error, neglect or ignorance from an organisation, as a breech of data integrity can be devastating for both …


Don't Be A Phish: Steps In User Education, Stefan Robila, James W. Ragucci Dec 2006

Don't Be A Phish: Steps In User Education, Stefan Robila, James W. Ragucci

Department of Computer Science Faculty Scholarship and Creative Works

Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced in the last year an increase in frequency and diversity. While regular phishing attacks are easily thwarted, designing the attack to include user context information could potentially increase the user's vulnerability. To prevent this, phishing education needs to be considered. In this paper we provide an overview of phishing education, focusing on context aware attacks and introduce a new strategy for educating users by combining phishing IQ tests and class discussions. The technique encompasses …


Serious Gordon Using Serious Games To Teach Food Safety In The Kitchen, Brian Mac Namee, Pauline Rooney, Patrick Lindstrom, Andrew Ritchie, Frances Boylan, Greg Burke Nov 2006

Serious Gordon Using Serious Games To Teach Food Safety In The Kitchen, Brian Mac Namee, Pauline Rooney, Patrick Lindstrom, Andrew Ritchie, Frances Boylan, Greg Burke

Conference papers

This paper will describe the development of Serious Gordon, an interactive digital game developed to tech the basics of kitchen food safety to workers in industries dealing with food. The motivations driving the development of the game will be described as will the development process itself. An initial evaluation of the game, from both a technical and pedagogical point of view, will be presented as will conclusions on the viability of using a commercial game engine for the purpose of developing educational games.


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty Articles

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …