Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
EDUCAUSE Quarterly | 4 |
ProQuest LLC | 2 |
Community College Journal of… | 1 |
EDUCAUSE | 1 |
Education and Information… | 1 |
Open Praxis | 1 |
Technology, Pedagogy and… | 1 |
WCET | 1 |
Author
Anderson, Alicia | 1 |
Ayfer Beylik | 1 |
Baris Yigit | 1 |
Cigularova, Daniela | 1 |
Costanzo, John | 1 |
Das, Santwana | 1 |
David Seyi Akanbi | 1 |
Esra Pinar Uça Günes | 1 |
Hans Kaushik | 1 |
Ihsan Günes | 1 |
Jamie Reeves | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 4 |
Reports - Research | 3 |
Dissertations/Theses -… | 2 |
Reports - Evaluative | 2 |
Opinion Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 12 |
Postsecondary Education | 12 |
Audience
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Higher Education Act 1965 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security
Esra Pinar Uça Günes; Nuray Gedik; Mehmet Ali Isikoglu; Baris Yigit; Ihsan Günes; Ayfer Beylik – Open Praxis, 2024
The primary objective of this manuscript is to examine the online assessment and exam security procedures during the pandemic, with a particular focus on higher education. In this context, the study investigates the measures employed by instructors, the challenges they encountered, and the strategies they employed to overcome these challenges in a…
Descriptors: Tests, Distance Education, Supervision, COVID-19
Hans Kaushik; Smriti Kaushik – Education and Information Technologies, 2024
The involvement of technology in the education domain has transformed the traditional system in many countries. The need was realized when 300 million students in India itself were pushed to move from traditional to various digital education platforms during the pandemic. There has been an essential emphasis given to the promotion of digital based…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Technology Uses in Education
Matt Paulson – ProQuest LLC, 2021
With the recent proliferation of information technology, almost all users of technology, no matter the field, profession, or status, have experienced a commensurate increase in information security threats. This, in turn, creates a significant concern in higher institutions of public learning. Information Security Officers in public higher…
Descriptors: Higher Education, Information Security, Computer Security, Information Policy
David Seyi Akanbi – ProQuest LLC, 2024
The demand for university education exceeds the supply in Nigeria, as more than 70% of eligible applicants cannot get admission into Nigerian universities annually. With a current population of 206 million, the World Bank predicts the Nigerian population will surpass the United States to become the third-largest country in the world by 2050. If…
Descriptors: Higher Education, Online Courses, Universities, Supply and Demand
Kathe Pelletier; Mark McCormack; Nicole Muscanell; Jamie Reeves; Jenay Robert; Nichole Arbino – EDUCAUSE, 2024
In the denouement of the COVID-19 pandemic, talk of a return to "normalcy" in higher education belies the great challenges and ongoing disruptions that yet lie ahead for many institutions. Public perceptions of the value of postsecondary education continue their downward slide, placing institutions in the position of having to…
Descriptors: Trend Analysis, Technology Uses in Education, Educational Technology, Artificial Intelligence
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
WCET, 2008
Much attention has been focused on the accountability, student learning outcomes, transfer of credit, and illegal file sharing provisions of the two related bills that have moved through the U.S. Senate and the House of Representatives to amend and extend the provisions of the 1965 Higher Education Act (S. 1642 and H.R. 4137). One of the…
Descriptors: Higher Education, Educational Technology, Distance Education, Integrity
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy