Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (2)
- Computer Sciences (2)
- Education (2)
- Information Security (2)
- Physical Sciences and Mathematics (2)
-
- Educational Methods (1)
- Electrical and Computer Engineering (1)
- Electromagnetics and Photonics (1)
- Higher Education (1)
- Instructional Media Design (1)
- Management Information Systems (1)
- Online and Distance Education (1)
- Scholarship of Teaching and Learning (1)
- Special Education and Teaching (1)
- Systems and Communications (1)
- Technology and Innovation (1)
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Engineering Education
Teaching Cybersecurity In An Undergraduate Engineering Course, Xiuli Qu, Xiaohong Yuan
Teaching Cybersecurity In An Undergraduate Engineering Course, Xiuli Qu, Xiaohong Yuan
KSU Proceedings on Cybersecurity Education, Research and Practice
Organizations create a huge amount of sensitive and confidential data, which must be protected from unauthorized access or disclosure. Nowadays, most organizations store their business data in digital formats. With the increasing use of digital data, data breaches are more often and serious in recent years. Therefore, it is very important for next-generation engineers to be aware of the importance of information security, and be able to recognize vulnerabilities and threats to an information system and design user-friendly and effective security measures. To achieve it, two modules of information systems security, including lectures and in-class labs, were developed and taught …
Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne
Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne
KSU Proceedings on Cybersecurity Education, Research and Practice
In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …
Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr
Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr
The African Journal of Information Systems
The integration of Internet-based collaborative tools such as Web 2.0 technologies to facilitate the design process has rendered collaborative design a chaotic practice filled with controversy and uncertainty, with the inevitable risk of unintended consequences. The purpose of this study was to trace the sources of design controversy in a Web 2.0 facilitated collaborative design process. The study employed an Actor Network Theory (ANT) methodological framework to explore design controversy in five design teams comprising of 4 to 6 undergraduate engineering students. Data was constituted by following the traces left by the actors, both human and nonhumans, their actions and …