Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 8 |
Descriptor
Source
Information Systems Education… | 2 |
Journal of Cybersecurity… | 2 |
Current Issues in Comparative… | 1 |
Interactive Learning… | 1 |
Internet and Higher Education | 1 |
Office of Inspector General,… | 1 |
Waikato Journal of Education | 1 |
Author
Anderson, John A. | 1 |
Baker, Elizabeth | 1 |
Brown, Randy | 1 |
Chou, Te-Shun | 1 |
Dongol, Brijesh | 1 |
Felisa Tibbitts | 1 |
Hempenius, Nicholas | 1 |
Henning, Marcus | 1 |
Lam, Tsz Yiu | 1 |
Laulaupea'alu, Siuta | 1 |
Reinicke, Bryan | 1 |
More ▼ |
Publication Type
Reports - Evaluative | 11 |
Journal Articles | 8 |
Numerical/Quantitative Data | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 9 |
Postsecondary Education | 8 |
Elementary Secondary Education | 2 |
Audience
Policymakers | 1 |
Location
New Zealand | 1 |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Elementary and Secondary… | 1 |
Family Educational Rights and… | 1 |
United Nations Convention on… | 1 |
Universal Declaration of… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Saah Agyemang-Badu; Felisa Tibbitts; Sage Phillips – Current Issues in Comparative Education, 2024
The treatment of artificial intelligence (AI) in the field of education has so far been typically characterized by (a) information about how AI can assist educators in carrying out their work, and (b) concerns about the misuse of AI by learners, for example, concerning plagiarism. The links between AI and ethics within the field of education are…
Descriptors: Artificial Intelligence, Elementary Secondary Education, Higher Education, Ethics
Lam, Tsz Yiu; Dongol, Brijesh – Interactive Learning Environments, 2022
The properties of a blockchain such as immutability, provenance, and peer-executed smart contracts could bring a new level of security, trust, and transparency to e-learning. In this paper, we introduce our proof-of-concept blockchain-based e-learning platform developed to increase transparency in assessments and facilitate curriculum…
Descriptors: Information Technology, Web Based Instruction, Instructional Innovation, Electronic Learning
Brown, Randy – Information Systems Education Journal, 2019
Information Security has been a challenge since humans began keeping information. With the advent of computerized data and computer networks, that challenge has increased dramatically. Not only are more breaches occurring, but public knowledge about those breaches is now commonplace adding to virtual hysteria concerning data and information…
Descriptors: Computer Security, Information Security, Professional Personnel, Specialists
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Laulaupea'alu, Siuta – Waikato Journal of Education, 2021
Learning online from home bubbles through the use of information communication technology (ICT) stretches the engagement and enactment of "va" (relational connections) between students and lecturers as well as Pacific people in the community. In this paper, "talanoa" is used to capture students' online learning experiences and…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Tsado, Lucy – Journal of Cybersecurity Education, Research and Practice, 2019
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not…
Descriptors: Information Security, National Security, Computer Security, Computer Science Education
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Henning, Marcus – Internet and Higher Education, 2004
In the current information age, there is a growing use of and reliance on the Internet. One area of concern for educators is the communication of information using an electronic questionnaire interface. Therefore, it seems pertinent to look at the issue of dissemination of Internet questionnaire information and the integrity of this process.…
Descriptors: Integrity, Questionnaires, Conflict Resolution, Internet
New York State Office of the Comptroller, Albany. Div. of Management Audit. – 2000
This audit report of the State University of New York (SUNY) College of Agriculture and Technology at Morrisville addresses the question of whether the college management has established an effective system of internal control over its revenue, equipment, and student work-study payroll. The audit makes a number of observations and conclusions.…
Descriptors: Accountability, Administration, Computer Security, Educational Finance
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality