Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 8 |
Descriptor
Source
Information Systems Education… | 2 |
ProQuest LLC | 2 |
Association Supporting… | 1 |
Australian Educational… | 1 |
International Association for… | 1 |
Journal of Cybersecurity… | 1 |
Author
Ahamed, Sheikh | 1 |
Booth, Kate | 1 |
Britton, Todd Alan | 1 |
Frydenberg, Mark | 1 |
Gilmore, Derrick C. | 1 |
Islam, Md Saiful | 1 |
Jacka, Lisa | 1 |
Lorenz, Birgy | 1 |
Payne, Bryson R. | 1 |
Riad, A. B. M. Kamrul | 1 |
Shahriar, Hossain | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Collected Works - Proceedings | 2 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 8 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
Audience
Location
Australia | 2 |
Asia | 1 |
Brazil | 1 |
California | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gilmore, Derrick C. – ProQuest LLC, 2022
Research administration is a matter of concern for institutions of higher education. While national trends reveal a lack of interest in investing in higher education institutions through federal and state allocations, such institutions have turned to sponsored research as a means of addressing critical issues of instruction, research, and public…
Descriptors: Research Administration, Small Colleges, Financial Support, Technology Integration
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Payne, Bryson R. – Journal of Cybersecurity Education, Research and Practice, 2019
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semiautonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number…
Descriptors: Computer Security, Motor Vehicles, Information Security, Artificial Intelligence
Britton, Todd Alan – ProQuest LLC, 2014
Purpose: The purpose of this study was to examine the key considerations of community, scalability, supportability, security, and functionality for selecting open-source software in California universities as perceived by technology leaders. Methods: After a review of the cogent literature, the key conceptual framework categories were identified…
Descriptors: Open Source Technology, Computer Software Selection, Scaling, Computer Security
Jacka, Lisa; Booth, Kate – Australian Educational Computing, 2012
Virtual worlds are highly immersive, engaging and popular computer mediated environments being explored by children and adults. Why then aren't more teachers using virtual worlds in the classroom with primary and secondary school students? Reasons often cited are the learning required to master the technology, low-end graphics cards, poor…
Descriptors: Foreign Countries, Computer Security, Educational Technology, Regional Programs
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers