Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 7 |
Descriptor
Author
Ahlgrim-Delzell, Lynn | 1 |
Bacak, Julie | 1 |
Brady D. Lund | 1 |
Byker, Erik Jon | 1 |
Diane P. Fabian | 1 |
Emily Paget | 1 |
Lidong Wang | 1 |
Martin, Florence | 1 |
Wagner, Jonathan | 1 |
Wang, Weichao | 1 |
Younge, Andrew J. | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Emily Paget – Journal of Learning for Development, 2024
Digital and information literacy skills are necessary to succeed in today's knowledge economy but for the millions of people in the world without internet access, a frustratingCatch-22 exists: How can they develop digital literacy skills without internet access? When they get access, what good is the internet to them if they don't have the skills…
Descriptors: Information Literacy, Digital Literacy, Video Technology, Access to Computers
Younge, Andrew J. – ProQuest LLC, 2016
With the advent of virtualization and Infrastructure-as-a-Service (IaaS), the broader scientific computing community is considering the use of clouds for their scientific computing needs. This is due to the relative scalability, ease of use, advanced user environment customization abilities, and the many novel computing paradigms available for…
Descriptors: Computers, Computer Networks, Client Server Architecture, Information Technology
Diane P. Fabian – ProQuest LLC, 2021
The patient portal is an electronic repository of health information, including doctor's notes, laboratory test results, and diagnostic imaging reports. There are limited studies that explore how individuals make sense of their health information, and use that understanding to increase health literacy. Education leaders should consider the ways…
Descriptors: Community Colleges, Patients, Allied Health Occupations Education, Computer Mediated Communication
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
Schools (public and nonpublic) and school districts face a myriad of challenging hazards and threats. In addition to natural hazards, technological hazards, and biological hazards, they now have to prepare for human-caused cyber threats. These incidents can be accidental or deliberate and disrupt education and critical operations; expose sensitive…
Descriptors: Computer Security, Information Security, Elementary Schools, Secondary Schools