Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer System Design | 4 |
| Identification | 4 |
| Computer Security | 3 |
| Higher Education | 2 |
| Information Technology | 2 |
| Privacy | 2 |
| Artificial Intelligence | 1 |
| Barriers | 1 |
| Campuses | 1 |
| Cheating | 1 |
| College Programs | 1 |
| More ▼ | |
Author
| Brown, Victoria | 1 |
| Grush, Mary | 1 |
| Nicoletti, Maria do Carmo | 1 |
| Zeltser, Lenny | 1 |
| de Oliveira, Osvaldo Luiz | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 4 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
A Machine Learning-Based Computational System Proposal Aiming at Higher Education Dropout Prediction
Nicoletti, Maria do Carmo; de Oliveira, Osvaldo Luiz – Higher Education Studies, 2020
In the literature related to higher education, the concept of dropout has been approached from several perspectives and, over the years, its definition has been influenced by the use of diversified semantic interpretations. In a general higher education environment dropout can be broadly characterized as the act of a student engaged in a course…
Descriptors: Artificial Intelligence, Man Machine Systems, Computation, Prediction
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces

Peer reviewed
Direct link
