David Argles

Learn More
Interest in educational gaming is on the rise once again, and particular interest has started to peak in the area of lightweight educational mini-games. But are these games really as useful as people suggest, or are they simply too shallow to convey sufficient pedagogical meaning? And how do we assess how well these games measure up as educational(More)
A classic challenge within Computer Science is to distribute data and processes so as to take advantage of multiple computers tackling a single problem in a simultaneous and coordinated way. This situation arises in a number of different scenarios, including Grid computing which is a secure, service-based architecture for tackling massively parallel(More)
The general security goals of computer a system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the(More)
We know how to build secure systems but for security measures to be truly effective it is necessary to use keys which are far too large for people to commit to memory. The consequence is that people avoid using security measures or they resort to recording their key information somewhere which they find convenient to access. If any kind of barrier to(More)
Today internet users use a single identity to access multiple services. With single sign-on (SSO), users don't have to remember separate username/password for each service provider, which helps the user to browse through the web seamlessly. SSO is however susceptible to phishing attacks. This paper describes a new anti phishing SSO model based on mobile QR(More)
As research continues into the use of computer games for educational purposes, the differences between different gaming genres become increasingly more important. These differences, however, appear to have been largely overlooked by the academic community, potentially resulting in incomplete results when considered against computer gaming as a whole. This(More)
The security of online summative assessments goes beyond ensuring that the ‘right’ student is authenticated at the initial login. More is required to ensure that the same authenticated student is present for the duration of the online test. In this paper, we explore the benefits and limitations of existing authentication methods as a technique(More)
Phishing is an ongoing problem which is constantly on the rise, with at least 221,271 unique phishing websites being reported in the first half of 2009. Currently, no solutions exist which wholly combat phishing, leading to large economic losses and personal distress. Phishing largely targets human vulnerabilities over technical ones, meaning there is an(More)
A big part of life long learning is the move from residential lectures to distance education. Distance education falls under the multi-modal policy of the teaching institution and thereby a change in student contact. The lecturer facilitating the distance education course is also faced with a problem where the quality and originality of submitted(More)