Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 6 |
Descriptor
Source
Journal of Cybersecurity… | 3 |
Journal of Computer Assisted… | 1 |
Journal of Learning for… | 1 |
ProQuest LLC | 1 |
Author
Ahlgrim-Delzell, Lynn | 1 |
Bacak, Julie | 1 |
Brady D. Lund | 1 |
Byker, Erik Jon | 1 |
Chander Diwaker | 1 |
Diane P. Fabian | 1 |
Emily Paget | 1 |
Lidong Wang | 1 |
Martin, Florence | 1 |
Neha Miglani | 1 |
Wagner, Jonathan | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 4 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Chander Diwaker; Neha Miglani – Journal of Computer Assisted Learning, 2025
Background: The ever-increasing computational demands call for optimal resource utilisation and system performance in the cloud environment. Organisations are increasingly migrating workloads to cloud platforms, mandating the need for efficient resource distribution. Load balancing, a critical cloud component, ensures equitable distribution of…
Descriptors: Internet, Information Storage, Educational Practices, Computation
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Emily Paget – Journal of Learning for Development, 2024
Digital and information literacy skills are necessary to succeed in today's knowledge economy but for the millions of people in the world without internet access, a frustratingCatch-22 exists: How can they develop digital literacy skills without internet access? When they get access, what good is the internet to them if they don't have the skills…
Descriptors: Information Literacy, Digital Literacy, Video Technology, Access to Computers
Diane P. Fabian – ProQuest LLC, 2021
The patient portal is an electronic repository of health information, including doctor's notes, laboratory test results, and diagnostic imaging reports. There are limited studies that explore how individuals make sense of their health information, and use that understanding to increase health literacy. Education leaders should consider the ways…
Descriptors: Community Colleges, Patients, Allied Health Occupations Education, Computer Mediated Communication