Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Descriptor
Computer Networks | 5 |
Ethics | 5 |
Computer Security | 3 |
Information Security | 3 |
Computer Science Education | 2 |
Data Collection | 2 |
Foreign Countries | 2 |
Graduate Students | 2 |
Privacy | 2 |
Student Attitudes | 2 |
Telecommunications | 2 |
More ▼ |
Source
Advances in Engineering… | 1 |
Australasian Journal of… | 1 |
International Journal of… | 1 |
Journal of Education for… | 1 |
Journal of Educational… | 1 |
Author
Bell, Kevin R. | 1 |
Ben-Jacob, Marion G. | 1 |
Bhunia, Swarup | 1 |
Livia Tomás | 1 |
Luzeckyj, Ann | 1 |
Ophélie Bidet | 1 |
Paul, Shubhra Deb | 1 |
Searle, Bill | 1 |
Toohey, Danny | 1 |
Vanderlelie, Jessica | 1 |
West, Deborah | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
Australia | 1 |
Florida | 1 |
France | 1 |
Spain | 1 |
Switzerland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Livia Tomás; Ophélie Bidet – International Journal of Social Research Methodology, 2024
Qualitative research has been strongly affected by the COVID-19 pandemic, highlighting the possibilities that Voice over Internet Protocol (VoIP) technologies such as Skype, WhatsApp, and Zoom offer to qualitative scholars. Based on the experience of using such technologies to collect qualitative data for our PhD studies, we present how we dealt…
Descriptors: Telecommunications, Qualitative Research, Interviews, Interpersonal Relationship
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs