Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Networks | 12 |
Computer Security | 12 |
Web Sites | 12 |
Internet | 11 |
Computer Software | 7 |
Computers | 6 |
Information Technology | 6 |
Telecommunications | 4 |
College Students | 3 |
Comparative Analysis | 3 |
Computer Science | 3 |
More ▼ |
Source
Author
Dixit, R. K. | 2 |
Alexander, Melody W. | 1 |
Ashford, Tina | 1 |
Cesarini, Paul | 1 |
Collins, Hilton | 1 |
Frank, Charles E. | 1 |
Gil-Garcia, J. Ramon | 1 |
Panettieri, Joseph C. | 1 |
Rogers, Gary | 1 |
Smith, Carol L., Ed. | 1 |
Smith, Peter, Ed. | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 5 |
Collected Works - Proceedings | 2 |
Collected Works - Serial | 2 |
Reports - Research | 2 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 3 |
Elementary Secondary Education | 2 |
Audience
Location
Florida | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Werner, Laurie A.; Frank, Charles E. – Information Systems Education Journal, 2010
Teaching a computer security course which includes network administration and protection software is especially challenging because textbook tools are out of date by the time the text is published. In an effort to use lab activities that work effectively, we turned to the internet. This paper describes several resources for teaching computer…
Descriptors: Information Security, Information Science Education, Video Technology, Computer Security
Dixit, R. K. – Online Submission, 2010
This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…
Descriptors: Diabetes, Computers, Computer Science, Telecommunications
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2005
This 2005 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Campus Technology: Anticipating the Future." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document include: (1) Developing…
Descriptors: Virtual Classrooms, Programming (Broadcast), Computers, Tests
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers