Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Global Approach | 3 |
| Foreign Countries | 2 |
| Information Security | 2 |
| Privacy | 2 |
| Artificial Intelligence | 1 |
| Bullying | 1 |
| Case Method (Teaching… | 1 |
| Case Studies | 1 |
| Computer Literacy | 1 |
| Computer Mediated… | 1 |
| More ▼ | |
Author
| Alison Lui | 1 |
| Catharina Womack | 1 |
| Cradduck, Lucy | 1 |
| Douma, Bambi | 1 |
| Gregory, Mark A | 1 |
| Lawrence, Cameron | 1 |
| Olson, Garrett | 1 |
| Penny Orton | 1 |
Publication Type
| Reports - Research | 3 |
| Journal Articles | 2 |
| Speeches/Meeting Papers | 1 |
Education Level
Audience
| Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alison Lui; Catharina Womack; Penny Orton – Education and Information Technologies, 2025
This article critically evaluates the effects of the ACU Virtual Mobility (VM) Project Digital Information Security Course (DISC) programme on improving students' awareness of cyber security skills, pre and post the educational intervention. Our selected VM tool is Collaborative Online International Learning (COIL). Building on a conceptual…
Descriptors: Cooperative Learning, Electronic Learning, Foreign Countries, Information Security
Gregory, Mark A; Cradduck, Lucy – International Association for Development of the Information Society, 2016
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Descriptors: Foreign Countries, Computer Security, Telecommunications, National Security
Lawrence, Cameron; Olson, Garrett; Douma, Bambi – Information Systems Education Journal, 2015
The widespread use of digital technologies such as smartphones, tablets, and notebook computers expose firms engaged in international business to risks that far exceed what most corporate technology users understand. This case study examines some of the technology-specific vulnerabilities managers face when engaged in international travel and…
Descriptors: Information Security, Computer Security, Global Approach, Travel

Peer reviewed
Direct link
