Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 5 |
Descriptor
Computer Security | 5 |
Information Networks | 5 |
Information Security | 4 |
Privacy | 3 |
Elementary Secondary Education | 2 |
Internet | 2 |
Budgets | 1 |
Compliance (Legal) | 1 |
Computer Networks | 1 |
Computer Software | 1 |
Computers | 1 |
More ▼ |
Source
ProQuest LLC | 2 |
E-Learning and Digital Media | 1 |
International Association for… | 1 |
National Forum on Education… | 1 |
Author
Barthur, Ashrith | 1 |
Brown, Brandon R. | 1 |
Cradduck, Lucy | 1 |
Gregory, Mark A | 1 |
Kailash Kumar | 1 |
Laiq Ahmed | 1 |
Md Alimul Haque | 1 |
Moidur Rahman | 1 |
Sana Zeba | 1 |
Senapathy Marisennayya | 1 |
Shameemul Haque | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 2 |
Guides - General | 1 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Audience
Administrators | 1 |
Parents | 1 |
Policymakers | 1 |
Location
Australia | 1 |
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Md Alimul Haque; Shameemul Haque; Sana Zeba; Kailash Kumar; Sultan Ahmad; Moidur Rahman; Senapathy Marisennayya; Laiq Ahmed – E-Learning and Digital Media, 2024
E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinence in the distance education system. Due to COVID-19, the online learning education system has become very popular. Most probably, all education systems have been using the IoT-based E-Learning system to continue the students' education without…
Descriptors: Electronic Learning, Internet, Information Networks, Technology Uses in Education
Barthur, Ashrith – ProQuest LLC, 2016
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding…
Descriptors: Computer Security, Information Security, Data Collection, Internet
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Gregory, Mark A; Cradduck, Lucy – International Association for Development of the Information Society, 2016
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Descriptors: Foreign Countries, Computer Security, Telecommunications, National Security
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks