Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Computer Software Evaluation | 4 |
Risk | 2 |
Access to Information | 1 |
Artificial Intelligence | 1 |
Classification | 1 |
Coding | 1 |
Colleges | 1 |
Computer Assisted Testing | 1 |
Computer Mediated… | 1 |
Computer Networks | 1 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Godfrey F. Mendes | 1 |
Mangalaraj, George | 1 |
Powell, Ken | 1 |
Russell, Terry | 1 |
Singh, Anil | 1 |
Taneja, Aakash | 1 |
Wickens, Cathy | 1 |
Woollard, John | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment
Singh, Anil; Mangalaraj, George; Taneja, Aakash – Journal of Information Systems Education, 2010
This paper offers a compilation of technologies that provides either free or low-cost solutions to the challenges of teaching online courses. It presents various teaching methods the outlined tools and technologies can support, with emphasis on fit between these tools and the tasks they are meant to serve. In addition, it highlights various…
Descriptors: Online Courses, Teaching Methods, Technology Uses in Education, Technology Integration
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law