Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 5 |
| Since 2017 (last 10 years) | 7 |
Descriptor
Source
| Journal of Cybersecurity… | 3 |
| Journal of Computer Assisted… | 1 |
| Journal of Learning for… | 1 |
| ProQuest LLC | 1 |
| Readiness and Emergency… | 1 |
Author
| Ahlgrim-Delzell, Lynn | 1 |
| Bacak, Julie | 1 |
| Brady D. Lund | 1 |
| Byker, Erik Jon | 1 |
| Chander Diwaker | 1 |
| Diane P. Fabian | 1 |
| Emily Paget | 1 |
| Lidong Wang | 1 |
| Martin, Florence | 1 |
| Neha Miglani | 1 |
| Wagner, Jonathan | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 5 |
| Reports - Research | 4 |
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
| Information Analyses | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
| Secondary Education | 1 |
| Two Year Colleges | 1 |
Audience
| Administrators | 1 |
| Teachers | 1 |
Location
| New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Chander Diwaker; Neha Miglani – Journal of Computer Assisted Learning, 2025
Background: The ever-increasing computational demands call for optimal resource utilisation and system performance in the cloud environment. Organisations are increasingly migrating workloads to cloud platforms, mandating the need for efficient resource distribution. Load balancing, a critical cloud component, ensures equitable distribution of…
Descriptors: Internet, Information Storage, Educational Practices, Computation
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Emily Paget – Journal of Learning for Development, 2024
Digital and information literacy skills are necessary to succeed in today's knowledge economy but for the millions of people in the world without internet access, a frustratingCatch-22 exists: How can they develop digital literacy skills without internet access? When they get access, what good is the internet to them if they don't have the skills…
Descriptors: Information Literacy, Digital Literacy, Video Technology, Access to Computers
Diane P. Fabian – ProQuest LLC, 2021
The patient portal is an electronic repository of health information, including doctor's notes, laboratory test results, and diagnostic imaging reports. There are limited studies that explore how individuals make sense of their health information, and use that understanding to increase health literacy. Education leaders should consider the ways…
Descriptors: Community Colleges, Patients, Allied Health Occupations Education, Computer Mediated Communication
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
Schools (public and nonpublic) and school districts face a myriad of challenging hazards and threats. In addition to natural hazards, technological hazards, and biological hazards, they now have to prepare for human-caused cyber threats. These incidents can be accidental or deliberate and disrupt education and critical operations; expose sensitive…
Descriptors: Computer Security, Information Security, Elementary Schools, Secondary Schools

Peer reviewed
Direct link
