Publication Date
In 2025 | 0 |
Since 2024 | 8 |
Descriptor
Computer Networks | 8 |
Data | 8 |
Computer Interfaces | 4 |
Computer System Design | 4 |
Computer Security | 3 |
Foreign Countries | 3 |
Data Use | 2 |
Improvement | 2 |
Information Security | 2 |
Accountability | 1 |
Algorithms | 1 |
More ▼ |
Source
Education and Information… | 2 |
American Journal on… | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Research in Education | 1 |
State Education Standard | 1 |
portal: Libraries and the… | 1 |
Author
Bui Thanh Hung | 1 |
Dan Li | 1 |
Emma Plourde | 1 |
Frances Jiménez | 1 |
Gayatri Parasa | 1 |
Grace Kamau | 1 |
Huichao Li | 1 |
Italo Masiello | 1 |
Joel Nakitare | 1 |
Lori L. Sussman | 1 |
Lyndsay Grant | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 6 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Kenya | 1 |
Sweden | 1 |
United Kingdom (England) | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Huichao Li; Dan Li – International Journal of Web-Based Learning and Teaching Technologies, 2024
Based on a brief analysis of the current situation of university education management and research on intelligent algorithms, this article constructs a university education management system based on big data. For the clustering and prediction modules in higher education management, corresponding algorithms are used for optimization design. A…
Descriptors: Data, Ideology, Algorithms, Multivariate Analysis
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Rina Dhopeshwarkar; Frances Jiménez; Sofia Ryan; Emma Plourde; Madjid Karimi – American Journal on Intellectual and Developmental Disabilities, 2024
Individuals with intellectual and developmental disabilities (IDD) continue to experience disparities in health and well-being despite improved provisions of person-centered care. Patient-centered outcomes research (PCOR) translates evidence into practice for meaningful outcomes. This piece describes findings from an environmental scan and…
Descriptors: Intellectual Disability, Developmental Disabilities, Medical Care Evaluation, Stakeholders
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Lyndsay Grant – Research in Education, 2024
The digitalisation and datafication of education has raised profound questions about the changing role of teachers' educational expertise and agency, as automated processes, data-driven analytics and accountability regimes produce new forms of knowledge and governance. Increasingly, research is paying greater attention to the significant role of…
Descriptors: Data, Computer Networks, Computer Interfaces, Computer System Design
Zeynab (Artemis) Mohseni; Italo Masiello; Rafael M. Martins – Education and Information Technologies, 2024
There is a significant amount of data available about students and their learning activities in many educational systems today. However, these datasets are frequently spread across several different digital services, making it challenging to use them strategically. In addition, there are no established standards for collecting, processing,…
Descriptors: Elementary School Students, Data, Individual Development, Learning Trajectories