NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
National Survey of Student…1
What Works Clearinghouse Rating
Showing 1 to 15 of 122 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Okike, Benedict O. I.; Adetoro, 'Niran – Education and Information Technologies, 2019
Advances in Information and Communication Technology have significantly affected the way information is acquired, processed, stored, retrieved, communicated as well as secured. This has changed the way Librarians handle and secure information systems while users are expected to have some level of information and communication technology skills to…
Descriptors: Foreign Countries, Users (Information), Information Technology, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Al-araibi, Asma Ali Mosa; Naz'ri bin Mahrin, Mohd; Yusoff, Rasimah Che Mohd; Chuprat, Suriayati Binti – Education and Information Technologies, 2019
The rate of adoption of e-learning has increased significantly in most higher education institutions in the world. E-learning refers to the use of electronic media, educational technology, also; information and communication technology (ICT) in the educational process. The aim for adopting e-learning is to provide students with educational…
Descriptors: Electronic Learning, Learning Readiness, Educational Technology, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Al-Azawei, Ahmed; Abdullah, Alharith A.; Mohammed, Mahmood K.; Abod, Zaid A. – International Review of Research in Open and Distributed Learning, 2023
Although online learning has become ubiquitous worldwide, earlier research has neglected the relationship between its actual use and security concerns. Learners' lack of security awareness while using learning technologies remains rarely studied. This paper integrates Delone and McLean's information system success (D&M-ISS) model with the…
Descriptors: Foreign Countries, Online Courses, Electronic Learning, Success
Peer reviewed Peer reviewed
Everitt, Cynthia Ann – Library Trends, 1981
Presents results of a survey which polled 37 university libraries to determine the attitudes, opinions, and perceptions of map librarians regarding unique security problems, addressing such factors as commercially designed security systems, written circulation policies, and access limitations. Twenty-six references are listed, and appendices…
Descriptors: Academic Libraries, Alarm Systems, Attitudes, Bibliographies
Ezeugo, Ernest; Klein, Carrie; Whitfield, Christina – State Higher Education Executive Officers, 2021
State postsecondary data systems contain a wealth of information--including detailed records about individuals--that allow states to analyze and improve their postsecondary education systems. The entities that maintain these systems operate in a context of concern about the privacy and security of educational records. They have both an interest in…
Descriptors: Privacy, Information Security, Information Systems, Postsecondary Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Connecticut State Dept. of Education, Hartford. Div. of Educational Administration. – 1980
This handbook is designed to assist persons who are concerned with preventing or minimizing property damage to schools through vandalism, arson, and theft, and with avoiding bodily injuries in and around school buildings. Many of the suggestions, while directed at the planning of new buildings, can be adapted to lessen the incidence of vandalism…
Descriptors: Alarm Systems, Check Lists, Construction Materials, Educational Facilities
Lorenzen, Michael – 1993
A survey was conducted of 104 Ohio academic libraries to determine how these libraries define security problems, what type of security problems existed in the libraries and what the extent of these problems was. The survey of 11 questions revealed the following: few Ohio academic libraries have a written security policy; a significant number…
Descriptors: Academic Libraries, Alarm Systems, Crime, Higher Education
Whitfield, Christina; Armstrong, John; Weeden, Dustin – State Higher Education Executive Officers, 2019
Since 2010, the State Higher Education Executive Officers Association (SHEEO) has periodically administered the "Strong Foundations" survey, which documents the content, structure, and effective use of state postsecondary student unit record systems (PSURSs). This report highlights the results of the fourth administration of the survey,…
Descriptors: Postsecondary Education, Information Systems, Student Records, Data Collection
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2008
EDUCAUSE Core Data Service Fiscal Year 2007 Summary Report summarizes much of the data collected through the 2007 EDUCAUSE core data survey about campus information technology (IT) environments at 994 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Jonathan D.; Levin, Douglas A. – Journal of Cases in Educational Leadership, 2020
School systems collect and maintain increasingly significant amounts of data and information on students, faculty, and staff and have a duty of care to ensure that sensitive information remains secure. Therefore, sitting and/or aspiring school leaders need to develop at least a basic understanding of data privacy and information security…
Descriptors: Information Security, School Policy, Policy Formation, Privacy
Huff, Susan M. – 1990
A modification of a University of Michigan form, this survey form is designed to obtain information on a freestanding library unit for preservation. The questionnaire covers the following areas: (1) library facility construction--e.g., primary building materials, characteristics of the foundation and roof, recent problems; (2) heating and cooling…
Descriptors: Climate Control, College Libraries, Crime Prevention, Electrical Systems
Morrison, LaVerne; And Others – 1982
This guide to the planning and design of school library or learning resources centers (LRC) is divided into two parts. Guidelines provided in the first section cover the planning responsibilities of the district LRC director and the learning resources specialist/librarian; development of educational specifications; location; required spaces;…
Descriptors: Accessibility (for Disabled), Check Lists, Educational Facilities Design, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Sefcik, Lesley; Veeran-Colton, Terisha; Baird, Michael; Price, Connie; Steyn, Steve – Australasian Journal of Educational Technology, 2022
This study aimed to understand the effects of a custom-developed, artificial intelligence-based, asynchronous remote invigilation system on the student user experience. The study was conducted over 3 years at a large Australian university, and findings demonstrate that familiarity with the system over time improved student attitudes towards remote…
Descriptors: Usability, Users (Information), Student Attitudes, Supervision
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9