Peter Clutterbuck

Learn More
The opinions expressed in this or any paper published by the Centre for Urban and Community Studies do not necessarily reflect the views of the Centre, or those of the University of Toronto. Authors Peter Clutterbuck works in a research and program development capacity with the Social Planning Network of Ontario. He is a member of the steering committee of(More)
One of the challenges in the contemporary education is improving learner's learning capability during the learning period through formative assessment in virtual learning environments. The formative assessment process requires learner to be active participants in the learning process by communicating and interacting with the instructor. The formative(More)
Web software that is designed and deployed to collect end-user information and transmit it to a remote server destination is proliferating. This overall software paradigm spans many scenarios – from fully legitimate software updating and remote management, to profiling user surfing habits (i.e. adware), to illicitly collecting personal user-information(More)
Internet technologies continue to revolutionize the legitimate collection of information from targeted host machines and its transmission to remote servers. The term ‘spyware’ refers to that subset of information collection software that operates illicitly and non-consensually. Two fundamental issues continue to complicate spyware(More)
The development of Web applications is an important focus of the modern information enabled organization – whether the Web application development is in-house, outsourced, or purchased as 'commercial-off-the-shelf' (COTS) software. Traditionally Web application development has been delivered via the dominant waterfall system. The waterfall system relies(More)
Wireless Local Area Networks (WLANs) provide many significant advantages to the contemporary business enterprise. WLANs also provide considerable security challenges for network administrators and users. Data confidentiality (ie, unauthorised access to data) breaches are the major security vulnerability within WLANs. To date, the major IT security standards(More)