This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 227Concordia University of Edmonton
- 96Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Education Research Project Final Reports (Concordia University of Edmonton)
- 34Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 28Concordia University of Edmonton/Independent Research Reports in Undergraduate Biology and Environmental Science (Concordia University of Edmonton)
- 17Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
2020
The role of wearable connected devices in healthcare is rapidly gaining importance. Collection of data through these smart devices is a key instrument in advancing biomedical research and in tracking of health indicators of an individual. Highly sensitive medical data requires advanced protection...
-
Internet security governance comparative analysis of country code Top Level Domain (ccTLD) administration
Download2008-01-12
Phishing presents a significant security challenge to Internet users, registries and registrars worldwide. The costs of phishing are significant and growing, and the increasing volume of phishing threatens to destroy the fabrics of online transactions. Vulnerabilities in domain registration...
-
Investigating the knowledge, attitudes and habits of academic users regarding computer usage policy
Download2010-01-08
Academic organizations typically require individuals using their information technology resources to agree to follow a set of rules regarding usage of those facilities and resources that the organization sets out as its computer usage policy document. Users may have to read a document, agree...
-
2009-01-08
Videoconferencing over Internet Protocol (IP) is a real-time, collaborative, virtual communication tool. However, current videoconferencing technology has not been built with the protection of the participants' privacy in mind. It is concerned only with the privacy of the conference session,...
-
2015-04-01
"If God is revealed in Jesus, how is God’s power to be understood? It is the argument of this thesis that the work of John Howard Yoder reveals God’s power as the simple event of love. A close reading of Yoder’s project locates a tension between his stated understanding of power and the...
-
Lived mentorship experiences: Reflections of early career teachers' journey with mentorship
Download2020
Many early career teachers leave the profession in the first five years despite the implementation of district mentorship programs. Building on Clandinin et al.’s (2015) research on teacher attrition which found that in Alberta 40% of teachers leave education in the first five years - this study...
-
2021-06-01
Bains, Jayant Singh, Goyal, Rahul, Kopanati, Hemanth Varma, Savaram, Bhargav Krishna
IoT devices have become the future of many industries like household, security, etc. but these devices have a requirement that is that they should be connected to a network. This makes them vulnerable to outside attacks. If security is built into each device, it would cost more and would not...
-
2021-09-01
All elements of the IT industry are expanding, including bandwidth, storage, processing speed. As a result, there are now more cyber threats and attacks, necessitating a creative and predictive security approach that employs cutting-edge technology to combat the danger. The trends will be...
-
2021-04-16
Software testing is a quality control activity which focuses on detecting defects which are then eventually removed. After completion of coding software products are subjected to system testing with the help of different test cases. These tests are essential and necessary to assess the...