22 research outputs found

    A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions

    Get PDF
    While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions

    Data-Driven Selection of Security Application Frameworks During Architectural Design

    Get PDF
    The selection of application frameworks is an important aspect of architectural design. Selection often requires satisficing, that is, searching a potentially large space of design alternatives until an acceptable solution is found. There is, however, little help for architects in selecting software frameworks. In this paper we investigate the criteria used by practicing software architects in selecting security frameworks. We also propose how information associated with some of the criteria that are important to architects can be obtained manually or in an automated way from online sources such as GitHub. Our ultimate goal is to identify measures associated with these criteria that can be helpful in providing support for architects to select software frameworks

    Seeds of Evidence: Integrating Evidence-Based Software Engineering

    Get PDF
    With increasing interest in Evidence-Based Software Engineering (EBSE), software engineering faculty face the challenge of educating future researchers and industry practitioners regarding the generation and use of EBSE results. We propose development and population of a community-driven web database containing summaries of EBSE studies. We present motivations for inclusion of these activities in a software engineering course, and address the particular appeal of a community-driven web database to students who have grown up in the Internet generation. We present our experience with integrating these activities into a graduate software engineering course, and report student and industry practitioner assessments of the resulting artifacts

    Teaching Object-Oriented Software Engineering Through Problem-Based Learning in the Context of Game Design

    Get PDF
    Although Object Orientation is emphasized in software engineering education, few have attempted to alleviate the initial learning curve associated with an inexperienced audience in non-computer science disciplines. The authors propose a Problem-Based Learning curriculum centered on game development to deliver basic Object-Oriented programming concepts in an interactive and engaging manner. Class activities occur within the context of the Object-Oriented Rational Unified Process. One of the most significant contributions of this paper lies in the design of class modules containing tasks intended to educate students on Object-Oriented Software Engineering in an incremental and self-actuated way

    Sang Pemimpi

    No full text

    Critical Factors and Resources in Developing a Game-Based Learning (GBL) Environment Using Free and Open Source Software (FOSS)

    No full text
    Engaging students in learning is often a challenge. It is even more so when the subject matter is non-trivial and requires a significant effort to master. Game-Based Learning (GBL) makes learning more interesting and appealing by seamlessly incorporating educational lessons into competitive games. Students naturally develop their interest in the materials and are immersed into learning as they compete with each other or against themselves in the game. To be effective, the game itself should be fun and engaging as well as accommodating the intended learning objectives. Although many people are aware of how effective GBL can be, it is overwhelming for a beginner to master the tools and techniques quickly to have GBL implemented in a class-room environment. We recognize this lack of guidance in the existing GBL literature and discuss critical factors in developing a GBL environment using the free and open source software (FOSS) resources available as of this writing

    Innovative learning environments in STEM higher education: opportunities, challenges, and looking forward

    No full text
    As explored in this open access book, higher education in STEM fields is influenced by many factors, including education research, government and school policies, financial considerations, technology limitations, and acceptance of innovations by faculty and students. In 2018, Drs. Ryoo and Winkelmann explored the opportunities, challenges, and future research initiatives of innovative learning environments (ILEs) in higher education STEM disciplines in their pioneering project: eXploring the Future of Innovative Learning Environments (X-FILEs). Workshop participants evaluated four main ILE categories: personalized and adaptive learning, multimodal learning formats, cross/extended reality (XR), and artificial intelligence (AI) and machine learning (ML). This open access book gathers the perspectives expressed during the X-FILEs workshop and its follow-up activities. It is designed to help inform education policy makers, researchers, developers, and practitioners about the adoption and implementation of ILEs in higher education

    Using Delphi Technique to Explorer Critical Factors in Cloud Security Auditing

    No full text
    The objectives of this study are (i) to identify crucial factors in security auditing specifically in cloud computing by IT auditors’ perception, (ii) to define whether there are any differences between IT auditing in general and IT auditing in Cloud Computing, (iii) to identify which factors are perceived more important based on respondent’s roles (IT auditors vs. audited community) using defined factor from (ii), and (iv) to examine whether there is any difference of opinion over cloud computing auditing between IT auditors and IT audited communities
    corecore