Alice studies computing, Bob takes computer forensics: a comparison of the pedagogy of cryptology education in two groups

Conference paper


Bennett, D. and Lewis, D. 2007. Alice studies computing, Bob takes computer forensics: a comparison of the pedagogy of cryptology education in two groups.
Permalink -

https://repository.canterbury.ac.uk/item/86262/alice-studies-computing-bob-takes-computer-forensics-a-comparison-of-the-pedagogy-of-cryptology-education-in-two-groups

  • 50
    total views
  • 0
    total downloads
  • 2
    views this month
  • 0
    downloads this month

Export as

Related outputs

Understanding the programming techniques using a complex case study to teach advanced object-oriented programming
Al-Jepoori, M. and Bennett, D. 2018. Understanding the programming techniques using a complex case study to teach advanced object-oriented programming. Proceedings of the World Academy of Science, Engineering and Technology. 12 (8), pp. 1060-1064. https://doi.org/10.5281/zenodo.1340570
Preventing digital crime
Bennett, D. and Stephens, P. 2016. Preventing digital crime. in: Bryant, R. (ed.) Policing Digital Crime New York Routledge. pp. 63-82
Understanding of the programming techniques by using a complex case study to teach advanced object-oriented programming
Al-Jepoori, M. and Bennett, D. 2018. Understanding of the programming techniques by using a complex case study to teach advanced object-oriented programming.
A usability analysis of autopsy forensic browser
Bennett, D. and Stephens, P. 2008. A usability analysis of autopsy forensic browser.
Assessing cryptography: evaluating students at undergraduate level
Bennett, D. 2010. Assessing cryptography: evaluating students at undergraduate level.