Publication Date
| In 2026 | 0 |
| Since 2025 | 22 |
| Since 2022 (last 5 years) | 209 |
| Since 2017 (last 10 years) | 353 |
| Since 2007 (last 20 years) | 457 |
Descriptor
| Computer Security | 460 |
| Information Security | 460 |
| Information Technology | 109 |
| Foreign Countries | 99 |
| Privacy | 93 |
| Computer Science Education | 90 |
| Internet | 90 |
| Computer Software | 68 |
| Teaching Methods | 66 |
| Higher Education | 60 |
| Educational Technology | 51 |
| More ▼ | |
Source
Author
| Lawrence, Cameron | 4 |
| Marquardson, Jim | 4 |
| Payne, Brian K. | 3 |
| Anderson, Jimmeka | 2 |
| Antonenko, Pavlo | 2 |
| Belshaw, Scott H. | 2 |
| Brooks, D. Christopher | 2 |
| Celeda, Pavel | 2 |
| Cigularova, Daniela | 2 |
| Clouse, Shawn | 2 |
| Cummings, Jeff | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Texas | 12 |
| Turkey | 10 |
| India | 9 |
| United Kingdom | 9 |
| Canada | 7 |
| United States | 7 |
| China | 6 |
| Florida | 6 |
| Maryland | 6 |
| North Carolina | 6 |
| Australia | 5 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
US Department of Education, 2018
The Department of Education Strategic Plan for Fiscal Years 2018-2022 describes the policy and operational priorities for the agency. The Plan details the Department's strategic goals and objectives over the next four years. The Plan also provides an overview of our Fiscal Year 2018-2019 Agency Priority Goals.
Descriptors: Strategic Planning, Educational Objectives, Elementary Secondary Education, Educational Improvement
Bennett, Jeannine B. – ProQuest LLC, 2012
This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…
Descriptors: Information Technology, Information Security, Change Strategies, Online Surveys
Shirley J. Caruso – Online Submission, 2016
This single instrumental qualitative case study explores and thickly describes job performance outcomes based upon the manner in which self-directed learning activities of a purposefully selected sample of 3 construction managers are conducted, mediated by the use of Web 2.0 technology. The data collected revealed that construction managers are…
Descriptors: Web 2.0 Technologies, Technology Uses in Education, Independent Study, Job Performance
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
California Community Colleges, Chancellor's Office, 2014
This 16th annual report highlights up-to-date information on the programs supported through the Chancellor's Office Telecommunications and Technology Infrastructure Program (TTIP). To summarize 2012-13, one would describe it as a year of planning and preparation. The system-wide budget cuts of the past few years, reports of impacted classes, staff…
Descriptors: Community Colleges, Telecommunications, Technology Integration, Technology Uses in Education
Wills, Lisa M. – New England Journal of Higher Education, 2011
When an individual hears the term risk, he/she usually thinks of the financial institutions whose mismanagement of risk was instrumental in causing the 2008 financial crash. But all organizations, including colleges and universities, face various types and levels of risk, which threaten to harm the institutions and their ability to fulfill their…
Descriptors: Higher Education, Risk Management, Risk, Access to Information
Chithambo, Loyce Maosa – ProQuest LLC, 2011
Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…
Descriptors: Information Technology, Teleworking, Information Security, Computer Security
Male, Trevor; Burden, Kevin – Technology, Pedagogy and Education, 2014
This article considers how developments in technologies have transformed the kind of social interaction possible over the Internet, making it feasible to undertake discourse and dialogue without having to rely solely on text-based mediation. This represents a fundamental change to learning, shifting from passive acquisition of someone else's ideas…
Descriptors: Technology Uses in Education, Technology Integration, Access to Computers, Access to Information
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security
Wu, Yejun – Journal of Education for Library and Information Science, 2013
This paper addresses the curriculum overlap and gap between LIS education and intelligence education by analyzing the content of the websites of the intelligence education programs and courses in 27 representative intelligence education universities in the United States, and the intelligence-related programs and courses in the 56 LIS programs in…
Descriptors: Library Science, Library Education, Web Sites, Computer Literacy
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Werner, Laurie A.; Frank, Charles E. – Information Systems Education Journal, 2010
Teaching a computer security course which includes network administration and protection software is especially challenging because textbook tools are out of date by the time the text is published. In an effort to use lab activities that work effectively, we turned to the internet. This paper describes several resources for teaching computer…
Descriptors: Information Security, Information Science Education, Video Technology, Computer Security
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
DeSantis, Nick – Chronicle of Higher Education, 2012
College campuses are hothouses of data, including course schedules, degree requirements, and grades. But much of the information remains spread out across software systems or locked on university servers. Start-up companies want to pry the information loose from campus servers in order to offer personalized services that could transform the…
Descriptors: Higher Education, Campuses, Grades (Scholastic), Scores

Direct link
Peer reviewed
