Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 25 |
| Since 2017 (last 10 years) | 53 |
| Since 2007 (last 20 years) | 241 |
Descriptor
| Computer Networks | 941 |
| Information Technology | 941 |
| Higher Education | 348 |
| Telecommunications | 256 |
| Information Networks | 244 |
| Technological Advancement | 198 |
| Internet | 193 |
| Foreign Countries | 175 |
| Educational Technology | 174 |
| Computer Uses in Education | 169 |
| Access to Information | 133 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 93 |
| Administrators | 54 |
| Policymakers | 27 |
| Media Staff | 18 |
| Teachers | 12 |
| Researchers | 6 |
| Students | 6 |
| Community | 2 |
Location
| United States | 28 |
| Canada | 21 |
| United Kingdom | 17 |
| Australia | 11 |
| New York | 11 |
| California | 9 |
| Ohio | 9 |
| Indiana | 8 |
| Spain | 7 |
| Finland | 6 |
| Florida | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
| Fast Response Survey System | 1 |
| Peabody Individual… | 1 |
| Program for International… | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Emmanuel C. Asogwa; Dunka D. Bakwa; Josephine O. Okpe; Jonathan Olelewe Chijioke – African Educational Research Journal, 2025
The integration of Information Technology (IT) in administrative settings has significantly enhanced management efficiency, minimized paperwork, and facilitated faster and more accurate service delivery. Despite these benefits, many administrative officers in higher education institutions still underutilize or neglect the adoption of networking…
Descriptors: College Administration, Administrator Effectiveness, Information Technology, Computer Networks
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Milena Patricia Rojas; Andrés Chiappe – Technology, Knowledge and Learning, 2024
Digital ecosystems are a set of interconnected elements that enable an integrated and seamless digital experience. In education, the use of Artificial Intelligence (AI) has great potential to improve teaching and learning. However, for the expectations placed on the educational use of AI to be met, it is necessary to develop adequate digital…
Descriptors: Literature Reviews, Artificial Intelligence, Information Technology, Information Networks
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Jorge J. Mendieta – ProQuest LLC, 2021
This qualitative descriptive study explored how full-time faculty of a California higher education institution described their experience with the Information Technology Services employees' commitment, communications, and quality of customer service when resolving classroom Wi-Fi issues. The study used the model of Total Quality Management (TQM)…
Descriptors: Information Technology, Higher Education, Technical Support, Teacher Attitudes
Chander Diwaker; Neha Miglani – Journal of Computer Assisted Learning, 2025
Background: The ever-increasing computational demands call for optimal resource utilisation and system performance in the cloud environment. Organisations are increasingly migrating workloads to cloud platforms, mandating the need for efficient resource distribution. Load balancing, a critical cloud component, ensures equitable distribution of…
Descriptors: Internet, Information Storage, Educational Practices, Computation
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Jiaheng Chen; Shicheng Chen – International Journal of Information and Communication Technology Education, 2023
Multimedia network technology refers to multimedia network teaching based on text data communication, which can make better use of sports resources in college physical education teaching. Multimedia technology combines computer and video technology. It refers to the combination of two or more sounds and images to form a system that can transmit…
Descriptors: Physical Education, Educational Change, Team Sports, Computer Networks
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Chris Sanders – ProQuest LLC, 2021
Despite significant investment in cyber security, the industry is unable to stem the tide of damaging attacks against computer networks. This unfortunate situation is, in part, because cyber security exists in a state of cognitive crisis defined by tacit knowledge and poorly understood processes. At the heart of the crisis are digital forensic…
Descriptors: Cognitive Ability, Thinking Skills, Crime, Computer Security

Peer reviewed
Direct link
