Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Electronic Learning | 3 |
Bibliometrics | 1 |
Biofeedback | 1 |
Capstone Experiences | 1 |
Classification | 1 |
Computer Science Education | 1 |
Concept Mapping | 1 |
Curriculum | 1 |
Data Analysis | 1 |
Definitions | 1 |
More ▼ |
Author
Abdollah, Faizal Mohd | 1 |
Guido Lang | 1 |
Jason H. Sharp | 1 |
John E. Anderson | 1 |
Mahalingam, Sheila | 1 |
Sahib, Shahrin | 1 |
Willy Ochaya | 1 |
Publication Type
Information Analyses | 3 |
Journal Articles | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jason H. Sharp; John E. Anderson; Guido Lang – Information Systems Education Journal, 2025
The "Information Systems Education Journal" has published uninterrupted since 2003. Over its publication history, it has covered myriad topics related to information systems education including model curriculum, outcomes assessment, online learning, capstone courses, service learning, data analytics, and cybersecurity, just to name a…
Descriptors: Information Systems, Computer Science Education, Educational Research, Bibliometrics
Willy Ochaya – International Journal of Online Graduate Education, 2018
Cyberattacks have a similar global economic impact of a natural disaster such as Hurricane Katrina, according to Lloyds, the world's specialist insurance market of London report. According to Lloyd's of London, global cyberattacks pose a considerable risk to businesses, health service, and education, resulting in average economic losses of between…
Descriptors: Computer Security, Internet, Electronic Learning, Handheld Devices
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
Descriptors: Electronic Learning, Computer Security, Reliability, Trust (Psychology)