Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 8 |
Descriptor
Information Security | 8 |
Information Technology | 8 |
Foreign Countries | 5 |
Higher Education | 4 |
Internet | 3 |
Privacy | 3 |
Technology Uses in Education | 3 |
COVID-19 | 2 |
Case Studies | 2 |
College Administration | 2 |
College Students | 2 |
More ▼ |
Source
Association of Governing… | 1 |
Commonwealth of Learning | 1 |
IGI Global | 1 |
International Association for… | 1 |
National Academies Press | 1 |
Online Submission | 1 |
Professional and… | 1 |
Research-publishing.net | 1 |
Author
Publication Type
Books | 8 |
Collected Works - General | 3 |
Collected Works - Proceedings | 2 |
Guides - Non-Classroom | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Adult Education | 1 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Grade 1 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Location
Philippines | 2 |
Portugal | 2 |
Albania | 1 |
Brazil | 1 |
China | 1 |
Croatia | 1 |
Estonia | 1 |
European Union | 1 |
Greece | 1 |
Indonesia | 1 |
Ireland | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Grech, Alex; Balaji, Venkataraman; Miao, Fengchun – Commonwealth of Learning, 2022
Blockchain is a verification infrastructure that offers a solution to the problem of how to verify digital identity. This publication is aimed at policy-makers in education who have an interest in understanding the affordances of blockchain technology to the education sector. Exploratory exercises with blockchain demonstrate that it is already…
Descriptors: Technology Uses in Education, Information Management, Information Security, Information Storage
Association of Governing Boards of Universities and Colleges, 2021
Every year, more news outlets report cybersecurity?breaches--and higher education is not immune from these sinister trends. Cyberattacks on colleges, universities, and foundations have become more frequent, more sophisticated, and more dangerous. Successful cyberattacks can compromise an institution's reputation, result in substantial financial…
Descriptors: Information Security, Higher Education, Governing Boards, Risk
Makewa, Lazarus Ndiku, Ed.; Ngussa, Baraka Manjale, Ed. – IGI Global, 2020
Effective use of technology in areas that include admissions, record keeping, billing, compliance, athletic administration, and more hold untold potential to transform higher education by introducing significant efficiencies and dramatic cost reductions in serving students. How the institution organizes itself will to a large extent depend on how…
Descriptors: Information Technology, Higher Education, Organizational Culture, College Faculty
Harteis, Christian, Ed. – Professional and Practice-based Learning, 2018
This edited volume brings together researchers from various disciplines (i.e. education, psychology, sociology, economy, information technology, engineering) discussing elementary changes at workplaces occurring through digitalization, and reflecting on educational challenges for individuals, organizations, and society. The latest developments in…
Descriptors: Computer Use, Change, Work Environment, Information Technology
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services
National Academies Press, 2013
"Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making" considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed;…
Descriptors: Labor Force Development, Information Security, Information Technology, Private Sector
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Fowley, Cathy, Ed.; English, Claire, Ed.; Thouësny, Sylvie, Ed. – Research-publishing.net, 2013
From 2000 to 2012 the number of Internet users rose from less than 0.4 billion to 2.4 billion. Scholarly, evidence-based Internet research is of critical importance. The field of Internet research explores the Internet as a social, political and educational phenomenon, providing theoretical and practical contributions to understanding, and…
Descriptors: Foreign Countries, Internet, Online Searching, Use Studies