NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 736 to 750 of 1,624 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hanbidge, Alice Schmidt; Mackenzie, Amanda; Sanderson, Nicole; Scholz, Kyle; Tin, Tony – International Association for Development of the Information Society, 2017
How do we close the gap between the lack of academic experience incoming students have--with the expectation that students know the rules of writing and taking exams? Academic integrity (AI) is essential in post-secondary academia yet insufficient time is allocated to teaching and practicing its concepts. Talks at orientation, lectures in the…
Descriptors: Academic Achievement, Integrity, Telecommunications, Handheld Devices
Brooks, D. Christopher; Pomerantz, Jeffrey – EDUCAUSE, 2017
For the fourteenth year, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology and higher education's most important end users, undergraduate students. For the 2017 report, 43,559 students from 124 institutions in 10 countries and 40 U.S. states participated in the research. The quantitative findings…
Descriptors: Undergraduate Students, Information Technology, Technology Uses in Education, Use Studies
Kramer, Aleksey – ProQuest LLC, 2013
The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…
Descriptors: Computer Software, Computer Security, Information Technology, Demography
Gurlen, Stephanie – ProQuest LLC, 2013
As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…
Descriptors: Banking, Information Security, Online Systems, Electronic Mail
US Department of Homeland Security, 2013
The "Stop.Think.Connect. Community Outreach Toolkit" was adapted from the Federal Trade Commission's "OnGuardOnline.gov," a project that provides practical tips to help guard against Internet fraud and protect your privacy. The kit will help you offer your community information about protecting kids online. It includes "Stop.Think.Connect.," a…
Descriptors: Internet, Computer Security, Computer Mediated Communication, Guides
Peer reviewed Peer reviewed
Direct linkDirect link
Berson, Michael J.; Berson, Ilene R. – Social Education, 2014
Educators have been increasingly sensitized to the role of schools in developing students' cyberethics, cybercitizenship, and cybersafety, which have emerged as one of the most pressing and yet unexplored areas of education. The Department of Defense has identified challenges to cybersecurity infrastructure as a significant risk for the…
Descriptors: Bullying, Computer Mediated Communication, School Role, School Safety
Aburto, Rafael – ProQuest LLC, 2014
This qualitative study examined efforts by the military organizations and federal agencies to improve information sharing, interoperability, and systems integration in all business practices. More specifically, a survey instrument with six open-ended and eight demographic questions was used to measure the perceived progress, issues, challenges of…
Descriptors: Qualitative Research, Shared Resources and Services, Access to Information, Agency Cooperation
Skallos, Maryly K. – ProQuest LLC, 2014
With funding cuts, reduced enrollments, and meeting a presidential initiative, Michigan community colleges need to find ways in which they can continue to provide quality education at an affordable price. Consumerization of information technology (IT) has been proposed to meet the technological needs of the community college. There is little…
Descriptors: Community Colleges, Qualitative Research, Information Technology, Administrators
Newmeyer, Kevin Patrick – ProQuest LLC, 2014
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Descriptors: Foreign Countries, Developing Nations, Computer Security, Information Security
Soghoian, Christopher – ProQuest LLC, 2012
Telecommunications carriers and service providers now play an essential role in facilitating modern surveillance by law enforcement agencies. The police merely select the individuals to be monitored, while the actual surveillance is performed by third parties: often the same email providers, search engines and telephone companies to whom consumers…
Descriptors: Telecommunications, Law Enforcement, Internet, Privacy
Burns, Mary B. – ProQuest LLC, 2012
The adage, "old habits die hard", is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. Despite intentions to change, humans do not…
Descriptors: Risk, Computer Security, Computers, Surveys
Tanque, Marcus M. – ProQuest LLC, 2012
The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…
Descriptors: Information Technology, Administrators, Adoption (Ideas), Administrator Attitudes
Roumani, Yaman – ProQuest LLC, 2012
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Descriptors: Computer Software, Risk, Computer Security, Information Technology
White, Lawrence – Association of Governing Boards of Universities and Colleges, 2015
A principle responsibility of a board member is to understand the environment in which his or her institution operates. Today, that environment includes a host of legal risks that every institution of higher education must be prepared to assess and proactively address. Colleges and universities work to contain and manage those risks through such…
Descriptors: Legal Problems, Sexual Abuse, Student Behavior, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – Learning, Media and Technology, 2013
Despite widespread internet provision in UK schools, there is little evidence to suggest resultant, sustained educational benefit. Drawing upon the notion of over-blocking, this paper explores how narrow notions of digital learning and over-zealous responses to internet risks limit students' educational experience. It is argued that this…
Descriptors: Foreign Countries, Educational Technology, Internet, Computer Security
Pages: 1  |  ...  |  46  |  47  |  48  |  49  |  50  |  51  |  52  |  53  |  54  |  ...  |  109