Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
College Students | 4 |
Computer Security | 4 |
Program Effectiveness | 4 |
Information Security | 3 |
College Instruction | 2 |
Case Studies | 1 |
Client Server Architecture | 1 |
Community Programs | 1 |
Computer Assisted Testing | 1 |
Computer Interfaces | 1 |
Computer Mediated… | 1 |
More ▼ |
Source
Computers & Education | 1 |
IEEE Transactions on Learning… | 1 |
Journal of Information… | 1 |
Online Submission | 1 |
Author
Anwar, M. | 1 |
Arreerard, Woraphapa | 1 |
Cheng, C. D. | 1 |
Greer, J. | 1 |
Ibrahim, Walid | 1 |
Ko, C. C. | 1 |
Ruangsan, Niraj | 1 |
Trabelsi, Zouheir | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Audience
Location
Thailand | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses
Ko, C. C.; Cheng, C. D. – Computers & Education, 2008
Electronic examination systems, which include Internet-based system, require extremely complicated installation, configuration and maintenance of software as well as hardware. In this paper, we present the design and development of a flexible, easy-to-use and secure examination system (e-Test), in which any commonly used computer can be used as a…
Descriptors: Computer Assisted Testing, Computers, Program Effectiveness, Examiners