A new character-level encryption algorithm: how to implement cryptography in an ICT classroom
It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of...
Saved in:
| Published in | Journal of Technology and Science Education Vol. 9; no. 3; pp. 257 - 268 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | English |
| Published |
JOTSE: Journal of technology and science education
2019
Journal of Technology and Science Education OmniaScience |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2013-6374 2014-5349 2013-6374 |
| DOI | 10.3926/JOTSE.491 |
Cover
| Abstract | It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in their last year at high school face the problem of deciding their professional future. Therefore, there is a wide field of research for them in cryptographic techniques. In this work we have developed, together with a group of high school students, a cryptographic algorithm with substitution and transposition techniques as described by Feistel (1973) in order to create a more comprehensive knowledge about what they have been studying in their ICT subjects. In most cases the teaching methods are based on the teachers' own vision, as well as on the absence of knowledge of alternative methods and/or the impossibility of applying them physically in the classroom. With the active and cooperative methodology put forward in this work, objectives such as hard work, autonomous and collaborative learning and the exchange of knowledge have been absolutely fulfilled. Achieving them requires replacing traditional methods so that the student can adapt to new work challenges. A group of students, only three of whom finished, were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we were able to program in Python as a final project a symmetrical character-level encryption algorithm we've referred to as Azrael. Our findings indicate a demand for future endeavours to take into account the need for more projectbased work in ICT classrooms. The exchange of ideas between teacher and students has been the driven force behind the success of this activity |
|---|---|
| AbstractList | Students who are studying their last year at High School face the problem of deciding their professional future. It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering.The aim of this paper is to explain how we solved a real problem - ensuring the confidentiality of information - with the knowledge acquired by students during their two years studying information and communication technologies (ICT).Three brilliant students were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we could design a symmetrical character-level encryption algorithm in the classroom as a final project that we named Azrael.Unfortunately, we did not have any scholarships or funding to do the extra work we had to do, only the personal satisfaction of seeing how the different skills were successfully applied to solve a real problem. Students who are studying their last year at High School face the problem of deciding their professional future. It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. The aim of this paper is to explain how we solved a real problem - ensuring the confidentiality of information - with the knowledge acquired by students during their two years studying information and communication technologies (ICT). Three brilliant students were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we could design a symmetrical character-level encryption algorithm in the classroom as a final project that we named Azrael. Unfortunately, we did not have any scholarships or funding to do the extra work we had to do, only the personal satisfaction of seeing how the different skills were successfully applied to solve a real problem. It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in their last year at high school face the problem of deciding their professional future. Therefore, there is a wide field of research for them in cryptographic techniques. In this work we have developed, together with a group of high school students, a cryptographic algorithm with substitution and transposition techniques as described by Feistel (1973) in order to create a more comprehensive knowledge about what they have been studying in their ICT subjects. In most cases the teaching methods are based on the teachers' own vision, as well as on the absence of knowledge of alternative methods and/or the impossibility of applying them physically in the classroom. With the active and cooperative methodology put forward in this work, objectives such as hard work, autonomous and collaborative learning and the exchange of knowledge have been absolutely fulfilled. Achieving them requires replacing traditional methods so that the student can adapt to new work challenges. A group of students, only three of whom finished, were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we were able to program in Python as a final project a symmetrical character-level encryption algorithm we've referred to as Azrael. Our findings indicate a demand for future endeavours to take into account the need for more project-based work in ICT classrooms. The exchange of ideas between teacher and students has been the driven force behind the success of this activity It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in their last year at high school face the problem of deciding their professional future. Therefore, there is a wide field of research for them in cryptographic techniques. In this work we have developed, together with a group of high school students, a cryptographic algorithm with substitution and transposition techniques as described by Feistel (1973) in order to create a more comprehensive knowledge about what they have been studying in their ICT subjects. In most cases the teaching methods are based on the teachers' own vision, as well as on the absence of knowledge of alternative methods and/or the impossibility of applying them physically in the classroom. With the active and cooperative methodology put forward in this work, objectives such as hard work, autonomous and collaborative learning and the exchange of knowledge have been absolutely fulfilled. Achieving them requires replacing traditional methods so that the student can adapt to new work challenges. A group of students, only three of whom finished, were voluntarily provided with the mentoring service in which the algorithm was designed. As a result, we were able to program in Python as a final project a symmetrical character-level encryption algorithm we've referred to as Azrael. Our findings indicate a demand for future endeavours to take into account the need for more projectbased work in ICT classrooms. The exchange of ideas between teacher and students has been the driven force behind the success of this activity |
| Audience | High Schools Secondary Education |
| Author | Arboledas Brihuega, David |
| Author_xml | – sequence: 1 fullname: Arboledas Brihuega, David |
| BackLink | http://eric.ed.gov/ERICWebPortal/detail?accno=EJ1215310$$DView record in ERIC |
| BookMark | eNp9kVGLEzEQgBc5wfO8B3-AkFfFPZNNNknFl1LqXY-DA62PEmans21KdrNkt5b-e9e2FH3xaYaZbz6GmdfZVRtbyrK3gt_JSaE_PT4vv8_v1ES8yK4LLmSupVFXf-Wvstu-9xUvC8NtYe119nPKWtoz3EACHCjlgX5RYNRiOnSDjy2DsI7JD5vmM9vEPRsi800XqKF2YEcorhN0mwPzI9uyxWzJMEDfpxibN9nLGkJPt-d4k_34Ol_OHvKn5_vFbPqUoxRG5FKbFVpFFogs1qYESdJU5QQn1pYIpAvQRFgVRFKQBj3hptZcWxRmVdbyJlucvKsIW9cl30A6uAjeHQsxrR2kwWMgZywSlLbkfFUpVBUopbVCURlUmhsYXV_OLg-hpeFf3bm2a33ycQuOejf9tuScCyWMNGYc_3Aa37UdHPYQwkUguPvzJreNQ09ufNMIvzvBlDxeuPmjKEQpBR_77099THG8KNX_dX08s_0O3fjNeNz4mCAMlwNIPW6q5G9_q7CH |
| ContentType | Journal Article |
| Copyright | LICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI |
| Copyright_xml | – notice: LICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI |
| DBID | 2VB ADOGN AFIUA AAYXX CITATION ERI GA5 ADTOC UNPAY AGMXS FKZ DOA |
| DOI | 10.3926/JOTSE.491 |
| DatabaseName | RACO Revistes Catalanes amb Accés Obert Revistes Catalanes amb Accés Obert (RACO) (Abstracts) Revistes Catalanes amb Accés Obert (RACO) CrossRef ERIC ERIC - Full Text Only (Discovery) Unpaywall for CDI: Periodical Content Unpaywall Dialnet (Open Access Full Text) Dialnet DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef ERIC |
| DatabaseTitleList | CrossRef ERIC |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: ERI name: ERIC url: https://eric.ed.gov/ sourceTypes: Open Access Repository – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) Mathematics |
| EISSN | 2013-6374 |
| ERIC | EJ1215310 |
| EndPage | 268 |
| ExternalDocumentID | oai_doaj_org_article_78cea58500db4c4ba44664c1b7c4607a oai_dialnet_unirioja_es_ART0001417377 10.3926/jotse.491 EJ1215310 10_3926_jotse_491 oai_raco_cat_article_364174 |
| GroupedDBID | 2VB 5VS ABOPQ ADBBV ADOGN AFIUA ALMA_UNASSIGNED_HOLDINGS BCNDV GROUPED_DOAJ KQ8 KWQ M~E OK1 AAYXX CITATION AAHSB ERI GA5 ADTOC IPNFZ RDL RIG UNPAY AGMXS FKZ |
| ID | FETCH-LOGICAL-c3171-367dc84e8aee8cf75a3e37b59c9885cae62a6eecb2ee31e6a6907f6068c17d5f3 |
| IEDL.DBID | ERI |
| ISSN | 2013-6374 2014-5349 |
| IngestDate | Fri Oct 03 12:48:55 EDT 2025 Thu Jul 20 13:40:58 EDT 2023 Mon Sep 15 10:08:30 EDT 2025 Fri Oct 03 12:21:52 EDT 2025 Tue Jul 01 01:08:43 EDT 2025 Tue Jan 28 21:04:28 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | http://creativecommons.org/licenses/by-nc/4.0 cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c3171-367dc84e8aee8cf75a3e37b59c9885cae62a6eecb2ee31e6a6907f6068c17d5f3 |
| Notes | JOTSE: Journal of technology and science education; No. 3 (2019): 2019, Vol. 9. núm. 3 JOTSE: Journal of technology and science education; Núm. 3 (2019): 2019, Vol. 9. núm. 3 2014-5349 2013-6374 |
| ORCID | 0000-0001-8922-1632 |
| OpenAccessLink | http://eric.ed.gov/ERICWebPortal/detail?accno=EJ1215310 |
| PageCount | 12 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_78cea58500db4c4ba44664c1b7c4607a dialnet_primary_oai_dialnet_unirioja_es_ART0001417377 unpaywall_primary_10_3926_jotse_491 eric_primary_EJ1215310 crossref_primary_10_3926_jotse_491 csuc_raco_oai_raco_cat_article_364174 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2019-00-00 |
| PublicationDateYYYYMMDD | 2019-01-01 |
| PublicationDate_xml | – year: 2019 text: 2019-00-00 |
| PublicationDecade | 2010 |
| PublicationTitle | Journal of Technology and Science Education |
| PublicationYear | 2019 |
| Publisher | JOTSE: Journal of technology and science education Journal of Technology and Science Education OmniaScience |
| Publisher_xml | – name: JOTSE: Journal of technology and science education – name: Journal of Technology and Science Education – name: OmniaScience |
| SSID | ssib052708288 ssj0000740176 ssib044745859 |
| Score | 2.0725312 |
| Snippet | It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we... Students who are studying their last year at High School face the problem of deciding their professional future. It is evident that the society in which we... |
| SourceID | doaj dialnet unpaywall eric crossref csuc |
| SourceType | Open Website Open Access Repository Index Database Publisher |
| StartPage | 257 |
| SubjectTerms | Active Learning Azrael Coding Computer Science Education Confidentiality Cooperative Learning Cryptography Cryptography, Azrael, symmetrical character-level encryption algorithm, substitution-permutation network, ICT Curriculum Implementation High School Students ICT Information Security level encryption algorithm Mathematics permutation network Programming Languages Student Attitudes Student Projects substitution symmetrical character Technology |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrZ1Nb9QwEIYttBe4IApUhLbIoiDBITQf_ki4larVthKcWqkXZNmTCaTaJtVuVlX_PePEG20PiAuHSJHlOM7YsZ9xJq8Z-0BUDIQNMq6TEshBcUnsfKyrc3VdSekJ1y8NfP-h5lfi4lpeb2315WPCRnng0XBHugC0xLRJUjkBwln_AVJA6jQIlegBjZKi3HKmhjHYbzSn1SglRAigjm66foVfRJk-moBmsFoDoa__SaPFPgj3T7HPT9ftnX24t4vF1qRz9oI9D7TIj8da7rAn2L5kO-F9XPFPQTT68yv285gTIHPY6C_HCx8NxCnf8mEYFbhd_OqWTf_79iufd_e873hzG4LH-ZApiFfzhvK2_PzkksMGrV-zq7PTy5N5HLZOiIGAII1zpSsoBBYWsYBaS5tjrp0soSwKCRZVZhUiuAwxT1FZ7yTX5MwUkOpK1vkum7Vdi28Yh6rOtMwAK0InOpzNHCZViViWIs-SiL3f2NPcjQoZhjwLb3QzGN2Q0SP20VvakAk64xWthxOwvQntbHIlyDmKmAxNMZXlc2_S1m2zbLoba3BliPcHBy_VudYR--Yb7vFFPoG60nSLf3WliO36Zp8KOb3w0hvEvxE7nDrC35_x7f-owx57RkhWjos8-2zWL9d4QNjTu3dDD_8DGjoCoQ priority: 102 providerName: Directory of Open Access Journals – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbQ9gAXoEBFeFQWDwkO2c3DjhNu26rVUomKQ1cqB2TZkwmkbJNqN6uq_HrGiXdFkZAQh0iWNXHiGSf5PnvymbE3hIqBYIMMq6gAIig2Cq3LdbW2qkopHcJ1UwOfTrPZXJycy3M_4bbyaZUXbbfCfhW_Vwx0MhGTvm7ivTkpnZB8a8qJKOKJcGKfO5kkLD5iO_PTz9Mvbkc5t21BlvYyzFQWoUxFMUgLESTIhgbHoohvfZBGsFoDQWH300aDnRfy3-ZC3103V-bm2iwWv32Ejh8wvbn9Iffkx3jd2TH8_EPZ8f_795Dd9_iUTweTXXYHm0ds178BVvydl6l-_5h9nXKC5Bw2is_hwuUfcbJb3vTvIW4W39pl3X2__MBn7TXvWl5f-nR13ht5uWxek23DPx6ecdiA-Sdsfnx0djgL_WYNIRAEicM0UyXkAnODmEOlpEkxVVYWUOS5BINZYjJEsAliGmNmHC2viD7lEKtSVukeGzVtg08Zh7JKlEwASwJrdFiTWIzKArEoRJpEAXu1iZi-GjQ5NHEZF1bd-1GT2wL21sVSkwta7TS0-wKYTnsn6zQTRMcCJn2wt205603duqmXdXthNK40MYyeUsYqVSpgB25o3D7JVVBct5dQOaAhQhZFpRVAHXGr5wJiq0BkkTIB23MDa9vI0YkT-yDEHbDX26H29z4--yer5-wePQDFMG_0go265RpfEpLq7L5_XH4BZj4h6g priority: 102 providerName: Unpaywall |
| Title | A new character-level encryption algorithm: how to implement cryptography in an ICT classroom |
| URI | https://raco.cat/index.php/JOTSE/article/view/364174 http://eric.ed.gov/ERICWebPortal/detail?accno=EJ1215310 https://www.jotse.org/index.php/jotse/article/download/491/403 https://dialnet.unirioja.es/servlet/oaiart?codigo=7637835 https://doaj.org/article/78cea58500db4c4ba44664c1b7c4607a |
| UnpaywallVersion | publishedVersion |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2013-6374 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000740176 issn: 2013-6374 databaseCode: KQ8 dateStart: 20110101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2013-6374 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000740176 issn: 2013-6374 databaseCode: DOA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2013-6374 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044745859 issn: 2014-5349 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pb9MwFLagHAoHxK-JbFBZ_DgGktiOE24l6lQqOpBopXFAlu28jE4lmdJU0y787TynaaCHSRwSRZbtyM8v9ve92J8JeYOo2CJsEH4RpBYJigl849a6GlMUuRAO4brQwPwsni757Fyc_w1d_O-KypkTRWBua9VdxNSHrIdzyREE97O0iKTTaWvPpkNC4AvG053GEGKD-P3sy-Lb5B1PwyEZ9vUezFIDu9laxMduJ0cJTafu3y-QHm7LK31zrdfrf2am00fkYQcp6XjnA4_JHSifkAfzXo9185T8GFMczWi2V2f2P7u1QnRS2vqmHTPoeH1R1avm568PdFpd06airW6wix3SzGXqpK3pqqS6pJ-yBc32wPsZWZ5OFtnU7w5W8C3ChdBnscxtwiHRAIktpNAMmDQitWmSCKshjnQMYE0EwEKItaPQBVKdxIYyFwU7IoOyKuE5oTYvIikiCzkCK7yMjgwEeQqQppxFgUde7Q2prnb6GQp5h7O8uqyaDSi0vEfeOhMrNEGlnN51-2B1o7rPR7GYI3XyiOj6oK_L5d6nbctVvaoutYKNQjbQ0r9QMik98tH12GEhl1DVF_0rZGJBo98EQW64xYa4P93chkZaHgdSe-TI9XdfSe8rHnnde8DtbTy-rfgJuY9ume7COi_IoKm38BKBTmNGbYBg1Do33ue_JyNyb3n2dfz9D7cP-3k |
| linkProvider | ERIC Clearinghouse on Information & Technology |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbQ9gAXoEBFeFQWDwkO2c3DjhNu26rVUomKQ1cqB2TZkwmkbJNqN6uq_HrGiXdFkZAQh0iWNXHiGSf5PnvymbE3hIqBYIMMq6gAIig2Cq3LdbW2qkopHcJ1UwOfTrPZXJycy3M_4bbyaZUXbbfCfhW_Vwx0MhGTvm7ivTkpnZB8a8qJKOKJcGKfO5kkLD5iO_PTz9Mvbkc5t21BlvYyzFQWoUxFMUgLESTIhgbHoohvfZBGsFoDQWH300aDnRfy3-ZC3103V-bm2iwWv32Ejh8wvbn9Iffkx3jd2TH8_EPZ8f_795Dd9_iUTweTXXYHm0ds178BVvydl6l-_5h9nXKC5Bw2is_hwuUfcbJb3vTvIW4W39pl3X2__MBn7TXvWl5f-nR13ht5uWxek23DPx6ecdiA-Sdsfnx0djgL_WYNIRAEicM0UyXkAnODmEOlpEkxVVYWUOS5BINZYjJEsAliGmNmHC2viD7lEKtSVukeGzVtg08Zh7JKlEwASwJrdFiTWIzKArEoRJpEAXu1iZi-GjQ5NHEZF1bd-1GT2wL21sVSkwta7TS0-wKYTnsn6zQTRMcCJn2wt205603duqmXdXthNK40MYyeUsYqVSpgB25o3D7JVVBct5dQOaAhQhZFpRVAHXGr5wJiq0BkkTIB23MDa9vI0YkT-yDEHbDX26H29z4--yer5-wePQDFMG_0go265RpfEpLq7L5_XH4BZj4h6g |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+new+character-level+encryption+algorithm%3A+How+to+implement+cryptography+in+an+ICT+classroom&rft.jtitle=Journal+of+technology+and+science+education&rft.au=David+Arboledas&rft.date=2019&rft.pub=OmniaScience&rft.eissn=2013-6374&rft.volume=9&rft.issue=3&rft.spage=257&rft.epage=268&rft_id=info:doi/10.3926%2Fjotse.491&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_78cea58500db4c4ba44664c1b7c4607a |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2013-6374&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2013-6374&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2013-6374&client=summon |