Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Oriented Programs | 4 |
| Computer Security | 4 |
| Computer Science Education | 3 |
| Information Technology | 3 |
| Blended Learning | 2 |
| Computer Assisted Testing | 2 |
| Conferences (Gatherings) | 2 |
| Courseware | 2 |
| Data Analysis | 2 |
| Educational Technology | 2 |
| Electronic Learning | 2 |
| More ▼ | |
Source
| Association Supporting… | 1 |
| International Association for… | 1 |
| Journal of Cybersecurity… | 1 |
| ProQuest LLC | 1 |
Author
| Hrishikesh Bhide | 1 |
| Isias, Pedro, Ed. | 1 |
| Issa, Theodora, Ed. | 1 |
| Issa, Tomayess, Ed. | 1 |
| Kommers, Piet, Ed. | 1 |
| Lidong Wang | 1 |
| McKay, Elspeth, Ed. | 1 |
| Smith, Peter, Ed. | 1 |
Publication Type
| Collected Works - Proceedings | 2 |
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Hrishikesh Bhide – ProQuest LLC, 2024
The meteoric rise in software and technology has altered the paradigm of information security and privacy. Classified information, stored earlier behind locked doors, is now stored on the internet on servers that can be accessed from anywhere on the globe. As a result of these advancements, we are now vulnerable to cyber-attacks. Cyber-attacks are…
Descriptors: Game Based Learning, Learning Strategies, Computer Security, Computer Science Education
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology

Direct link
Peer reviewed
