Publication Date
| In 2015 | 0 |
| Since 2014 | 11 |
| Since 2011 (last 5 years) | 157 |
| Since 2006 (last 10 years) | 461 |
| Since 1996 (last 20 years) | 791 |
Descriptor
| Computer Security | 827 |
| Internet | 313 |
| Information Technology | 282 |
| Computer Networks | 170 |
| Higher Education | 161 |
| Computer Software | 157 |
| Privacy | 138 |
| Educational Technology | 132 |
| Computer Uses in Education | 109 |
| Access to Information | 108 |
| More ▼ | |
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Panettieri, Joseph C. | 6 |
| Foster, Andrea L. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| Hope, Andrew | 4 |
| Rudy, Julia A. | 4 |
| More ▼ | |
Publication Type
Showing 1 to 15 of 827 results
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Murray, Neil – Language Assessment Quarterly, 2014
The growing number of students from increasingly diverse backgrounds--both English speaking and non-English speaking--entering English-medium institutions of higher education has put unprecedented pressure on universities to think creatively about efficient and cost-effective ways of identifying students at risk linguistically. Having done so,…
Descriptors: Language Tests, English (Second Language), Second Language Learning, Models
Mahalingam, Sheila; Abdollah, Mohd Faizal; bin Sahibuddin, Shahrin – International Journal of Distance Education Technologies, 2014
Mobile Learning has a potential to improve efficiency in the education sector and expand educational opportunities to underserved remote area in higher learning institutions. However there are multi challenges in different altitude faced when introducing and implementing m-learning. Despite the evolution of technology changes in education,…
Descriptors: Electronic Learning, Computer Security, Reliability, Computer System Design
Loughry, Misty L.; Ohland, Matthew W.; Woehr, David J. – Journal of Marketing Education, 2014
Colleges of business must meet assurance of learning requirements to gain or maintain AACSB accreditation under the new standards adopted April 8, 2013. Team skills are among the most important skills desired by recruiters, yet employers and scholars perceive that team skills are frequently deficient in college graduates. This article describes…
Descriptors: Higher Education, Business Administration Education, Accreditation (Institutions), Teamwork
Hope, Andrew – Learning, Media and Technology, 2013
Despite widespread internet provision in UK schools, there is little evidence to suggest resultant, sustained educational benefit. Drawing upon the notion of over-blocking, this paper explores how narrow notions of digital learning and over-zealous responses to internet risks limit students' educational experience. It is argued that this…
Descriptors: Foreign Countries, Educational Technology, Internet, Computer Security
Coggins, Porter E. – Computers in the Schools, 2013
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Descriptors: Computer Security, Elementary School Students, Student Attitudes, Computer Attitudes
Pittman, Jason – Journal of Information Technology Education: Research, 2013
The use of laboratories as part of cybersecurity education is well evidenced in the existing literature. We are informed about the benefits, different types of laboratories and, in addition, underlying learning theories therein. Existing research also demonstrates that the success of employing cybersecurity laboratory exercises relies upon…
Descriptors: Computer Security, Laboratories, Technology Uses in Education, Delivery Systems
Floros, Georgios D.; Siomos, Konstantinos E.; Fisoun, Virginia; Dafouli, Evaggelia; Geroukalis, Dimitrios – Journal of School Health, 2013
Background: The introduction of new technological media worldwide has had a number of unfortunate side effects for some adolescents, including cases of bullying others through the new media (cyberbullying) and over-involvement to the point of addiction. We examine the epidemiology of cyberbullying in a Greek setting, compare it with earlier data,…
Descriptors: Adolescents, Computer Mediated Communication, Bullying, Peer Relationship
Korkmaz, Murat; Esen, Binnaz Kiran – Education, 2013
The aim of this study is to design and evaluate a peer-training program about changing students' internet use habits. This study was conducted with students from two different elementary schools in Mersin, Turkey, who were enrolled in 7th or 8th grade in the 2009-2010 academic year. A total of 24 students participated in the program, 12 of…
Descriptors: Peer Teaching, Elementary School Students, Foreign Countries, Experimental Colleges
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education

Peer reviewed
Direct link
