Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Descriptor
Author
Brady D. Lund | 1 |
Bui Thanh Hung | 1 |
Gayatri Parasa | 1 |
Lidong Wang | 1 |
Lockias Chitanana | 1 |
Prasun Chakrabarti | 1 |
S. Siva Shankar | 1 |
Tulika Chakrabarti | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Lockias Chitanana – Education and Information Technologies, 2024
This study investigated how lecturers and university students used WhatsApp as an academic tool. The study employed an ANT methodological and analytical framework to investigate WhatsApp as an academic tool in a university set-up in post COVID-19 era. Participants were selected from one state university. The snowball purposive sampling approach…
Descriptors: Educational Technology, Technology Uses in Education, Computer Oriented Programs, College Faculty
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation