Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 8 |
Descriptor
Source
| Association Supporting… | 1 |
| Computers in the Schools | 1 |
| Education and Information… | 1 |
| International Association for… | 1 |
| International Educational… | 1 |
| International Journal of… | 1 |
| ProQuest LLC | 1 |
| T.H.E. Journal | 1 |
Author
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Collected Works - Proceedings | 2 |
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Elementary Education | 2 |
| Elementary Secondary Education | 2 |
| Grade 6 | 2 |
| Higher Education | 2 |
| Postsecondary Education | 2 |
| Grade 4 | 1 |
| Grade 5 | 1 |
| Intermediate Grades | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Secondary Education | 1 |
| More ▼ | |
Audience
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Finland | 1 |
| Florida | 1 |
| France | 1 |
| Germany | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Debnath, Diptasree; Ghosh, Emlon; Banik, Barnali Gupta – International Journal of Web-Based Learning and Teaching Technologies, 2020
Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation…
Descriptors: Computer Security, Information Security, Privacy, Color
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Barta, Brian J. – ProQuest LLC, 2014
Despite the continued demand for open source security software, a gap in the identification of success factors related to the success of open source security software persists. There are no studies that accurately assess the extent of this persistent gap, particularly with respect to the strength of the relationships of open source software…
Descriptors: Open Source Technology, Computer Software, Computer Security, Information Retrieval
Coggins, Porter E. – Computers in the Schools, 2013
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Descriptors: Computer Security, Elementary School Students, Student Attitudes, Computer Attitudes
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
Direct link
