Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 10 |
Descriptor
| Computer Security | 21 |
| Models | 21 |
| Internet | 7 |
| Higher Education | 5 |
| Information Security | 5 |
| Educational Technology | 4 |
| Ethics | 4 |
| Information Technology | 4 |
| Curriculum Development | 3 |
| Foreign Countries | 3 |
| Guidelines | 3 |
| More ▼ | |
Source
Author
| Aggelis, George | 1 |
| Alhamdani, Wasim A. | 1 |
| Bangert-Drowns, Robert | 1 |
| Bartram, Dave | 1 |
| Baykal, Adnan | 1 |
| Berg, George | 1 |
| Bertino, Elisa | 1 |
| Bleimann, U. | 1 |
| Bloniarz, Peter | 1 |
| Cai, Zixing | 1 |
| Campbell, John P. | 1 |
| More ▼ | |
Publication Type
| Reports - Descriptive | 21 |
| Journal Articles | 19 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 9 |
| Postsecondary Education | 9 |
Audience
| Community | 1 |
Location
| Australia | 1 |
| Florida (Miami) | 1 |
| Germany | 1 |
| Maryland | 1 |
| Massachusetts (Boston) | 1 |
| Missouri (Saint Louis) | 1 |
| New York (New York) | 1 |
| North Carolina | 1 |
| Portugal | 1 |
| United Kingdom | 1 |
| Wisconsin (Milwaukee) | 1 |
| More ▼ | |
Laws, Policies, & Programs
| Universal Declaration of… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Mazlina Abdul Majid; Husnul Ajra; Mohammad Adam Ibrahim Fakhreldin; Md. Shohidul Islam; Khalid Adam Ismail Hammad – International Society for Technology, Education, and Science, 2023
One of the most persuasive technologies in developing universities' smart campus applications is the Internet of Things (IoT) technique. Deploying thousands of readily available devices connected to IoT systems by ignoring device vulnerabilities and threat strategies in smart campus infrastructure is exacerbating security challenges. Moreover,…
Descriptors: Educational Technology, Technology Uses in Education, Computer Security, Technological Literacy
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Business-Higher Education Forum, 2019
"Creating Purposeful Partnerships" offers insights into business-led regional talent ecosystems that facilitate access, alignment, and development of a prepared workforce with the skills necessary for companies' long-term success. The findings of this report serve as a playbook for CEOs and their executive teams for establishing…
Descriptors: Partnerships in Education, School Business Relationship, Higher Education, Teamwork
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Murray, Neil – Language Assessment Quarterly, 2014
The growing number of students from increasingly diverse backgrounds--both English speaking and non-English speaking--entering English-medium institutions of higher education has put unprecedented pressure on universities to think creatively about efficient and cost-effective ways of identifying students at risk linguistically. Having done so,…
Descriptors: Language Tests, English (Second Language), Second Language Learning, Models
Geng, Lihua – Higher Education Studies, 2011
In the process of textbook management of universities, the flow of storage, collection and check of textbook is quite complicated and daily management flow and system also seriously constrains the efficiency of the management process. Thus, in order to combine the information management model and the traditional management model, it is necessary…
Descriptors: Management Information Systems, Information Management, Database Design, Database Management Systems
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Peer reviewedBertino, Elisa; And Others – Information Systems, 1997
Presents a temporal access control model that provides for decentralized administration of authorizations. The model permits the specification of rules based on four temporal operators, to derive additional authorizations from the presence or absence of other authorizations. Also, the model provides flexibility and several protection requirements…
Descriptors: Access to Information, Computer Security, Decentralization, Models
Bartram, Dave – International Journal of Testing, 2006
The Internet has opened up a whole new set of opportunities for advancing the science of psychometrics and the technology of testing. It has also created some new challenges for those of us involved in test design and testing. In particular, we are seeing impacts from internationalization of testing and new models for test delivery. These are…
Descriptors: Internet, Testing, Computer Security, Confidentiality
Teixeira, Claudio; Pinto, Joaquim Sousa; Martins, Joaquim Arnaldo – Campus-Wide Information Systems, 2008
Purpose: The aim of this paper is to describe a project to provide an online web portal that can be used as a front-end for all university users--students, teachers, staff--and services, library, administration, e-learning, and e-mail. Design/methodology/approach: The profile model proposed is mainly inheritable, defined by profile components with…
Descriptors: Information Systems, Profiles, Internet, Web Sites
Carpenter, Cal – Learning & Leading with Technology, 1996
Considers ethics issues involved with using online resources like the Internet in elementary and secondary education and suggests that educators initiate and model a standardized role of ethical behavior for Internet users. Topics include hackers; privacy, piracy, and security; screening electronic sites; ethics education; and an ethics model.…
Descriptors: Computer Security, Elementary Secondary Education, Ethics, Internet
Peer reviewedGritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models
Peer reviewedSmith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Peer reviewedLiao, Gen-Yih; Hwang, Jing-Jang – Internet Research, 2001
Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)
Descriptors: Business, Computer Oriented Programs, Computer Security, Consumer Economics
Previous Page | Next Page ยป
Pages: 1 | 2
Direct link
