Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 8 |
Descriptor
Handheld Devices | 8 |
Information Security | 8 |
Telecommunications | 5 |
Higher Education | 4 |
College Administration | 3 |
Computer Security | 3 |
Technology Uses in Education | 3 |
Campuses | 2 |
Computer Software | 2 |
Crime | 2 |
Guidelines | 2 |
More ▼ |
Source
CURRENTS | 1 |
Chronicle of Higher Education | 1 |
EDUCAUSE Review | 1 |
Education Digest: Essential… | 1 |
International Association for… | 1 |
Journal of Information… | 1 |
Science Teacher | 1 |
TechTrends: Linking Research… | 1 |
Author
Bele, Julija Lapuh | 1 |
Cater, Scott | 1 |
Corn, Michael | 1 |
DeSantis, Nick | 1 |
Dimc, Maja | 1 |
Gentile, Mark | 1 |
Gonzalez, Jennifer | 1 |
Harris, Mark A. | 1 |
Harron, Jason | 1 |
Hooper, Simon | 1 |
Jemec, Andreja Sladoje | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 8 |
Journal Articles | 7 |
Guides - Non-Classroom | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Audience
Teachers | 1 |
Location
Canada | 1 |
Illinois | 1 |
Kansas | 1 |
Massachusetts | 1 |
Michigan | 1 |
New York | 1 |
Pennsylvania | 1 |
United Kingdom | 1 |
Virginia | 1 |
Washington | 1 |
West Virginia | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott – Science Teacher, 2017
The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…
Descriptors: Crime, Telecommunications, Handheld Devices, Science Instruction
Zydney, Janet Mannheimer; Hooper, Simon – TechTrends: Linking Research and Practice to Improve Learning, 2015
Educators can use video to gain invaluable information about their students. A concern is that collecting videos online can create an increased security risk for children. The purpose of this article is to provide ethical and legal guidelines for designing video-based apps for mobile devices and the web. By reviewing the literature, law, and code…
Descriptors: Video Technology, Computer Software, Computer System Design, Design Requirements
Bele, Julija Lapuh; Dimc, Maja; Rozman, David; Jemec, Andreja Sladoje – International Association for Development of the Information Society, 2014
The widespread use of mobile devices that enable Internet access increases the exposure of both individuals and organizations to cybercrime. This article addresses the issue of strategic prevention of cybercrime with the key focus on the measures to prevent cybercrime related to children and teenagers. The primary tool for such prevention is…
Descriptors: Consciousness Raising, Internet, Crime, Information Security
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Gentile, Mark – Education Digest: Essential Readings Condensed for Quick Review, 2012
Today, corporate users are not the only ones rapidly embracing mobile tablets for daily use--this transition has spilled over into the education sector. Schools have begun incorporating mobile devices such as iPads and other tablets into their curriculum. While this trend brings new and exciting educational opportunities, administrators and…
Descriptors: Handheld Devices, Classroom Environment, Classroom Techniques, Technology Integration
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
DeSantis, Nick – Chronicle of Higher Education, 2012
College campuses are hothouses of data, including course schedules, degree requirements, and grades. But much of the information remains spread out across software systems or locked on university servers. Start-up companies want to pry the information loose from campus servers in order to offer personalized services that could transform the…
Descriptors: Higher Education, Campuses, Grades (Scholastic), Scores
Lum, Lydia – CURRENTS, 2012
At the end of 2010, for the first time ever, smartphones outsold PCs. Mobile device adoption rates continue to rise rapidly around the world. A recent forecast by Cisco found that global mobile data traffic more than doubled last year, and by the end of 2012, the number of mobile devices in use will outnumber the world's population. In the United…
Descriptors: Foreign Countries, Higher Education, Community Colleges, Institutional Advancement