NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Changchit, Chuleeporn – International Journal of Information and Communication Technology Education, 2015
Cloud computing has become increasingly popular among users and businesses around the world, and education is no exception. Cloud computing can bring an increased number of benefits to an educational setting, not only for its cost effectiveness, but also for the thirst for technology that college students have today, which allows learning and…
Descriptors: Internet, Information Storage, Computer Software, Technology Integration
McShane, Ian; Dearman, Philip – Australian Association for Research in Education, 2016
This paper examines the rise and fall of the Victorian education department's learning management system Ultranet. The Ultranet was conceived as a web-based portal that was designed to integrate and deliver on a range of policy objectives in the areas of student management, school networking and communication, and teaching and learning. Heavily…
Descriptors: Foreign Countries, Educational Technology, Computer Software, Technology Integration
Pagano, Matthew Wallach – ProQuest LLC, 2013
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Descriptors: Patients, Health Services, Information Technology, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet