Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 15 |
Descriptor
Computer Software | 15 |
Handheld Devices | 15 |
Information Security | 15 |
Telecommunications | 9 |
Privacy | 6 |
Computer Security | 5 |
Computer Mediated… | 4 |
Foreign Countries | 4 |
Higher Education | 4 |
Student Attitudes | 4 |
Teaching Methods | 4 |
More ▼ |
Source
Author
Al Bairaq, Saeed | 1 |
Al Matrooshi, Mohammed | 1 |
Alharbi, Wafa Owaydhah | 1 |
Almohri, Hussain M. J. | 1 |
Alturki, Khaled Ibrahim | 1 |
Chin, Amita G. | 1 |
Corn, Michael | 1 |
Fong, Maria | 1 |
Gao, Linxia | 1 |
Green, Julie | 1 |
Hooper, Simon | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 6 |
Dissertations/Theses -… | 4 |
Collected Works - Proceedings | 2 |
Reports - Descriptive | 2 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 6 |
Elementary Education | 1 |
Audience
Location
Australia | 1 |
Illinois | 1 |
Israel | 1 |
Kansas | 1 |
Saudi Arabia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chin, Amita G.; Little, Philip; Jones, Beth H. – International Journal of Education and Development using Information and Communication Technology, 2020
In 2019, the number of smartphone users in the United States was estimated to be over 266 million, or 81% of the population. While smartphones, combined with a plethora of apps that are readily available, have become wholly integrated into our daily lives, they embody a multitude of risks for consumers. The purpose of this study is to assess…
Descriptors: State Universities, Undergraduate Students, Telecommunications, Handheld Devices
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Ye, Pinghao; Liu, Liqiong; Gao, Linxia; Mei, Quanjun – International Journal of Information and Communication Technology Education, 2020
The article finds the main factors affecting women's continuance intention for mobile games, and analyze how and to what extent these factors affect women's continuance intention for mobile games in a research model. In this study, a Model of Factors Affecting Women's continued interest in mobile gaming is comprised of eight variables and relevant…
Descriptors: Females, Computer Games, Telecommunications, Handheld Devices
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Alharbi, Wafa Owaydhah; Alturki, Khaled Ibrahim – English Language Teaching, 2018
The study aimed to identify the degree of social media contribution to reinforcing digital citizenship meaning from the viewpoint of female students at Imam Mohammed bin Saud Islamic University in Riyadh. The study was an attempt to answer the following two questions in order to achieve the objectives of the study: To which extent does SnapChat…
Descriptors: Social Media, Females, Foreign Countries, College Students
Zilka, Gila Cohen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Aim/Purpose: Following the widespread use of social networking applications (SNAs) by children, adolescents, and young adults, this paper sought to examine the usage habits, sharing, and dangers involved from the perspective of the children, adolescents, and young adults. The research question was: What are the usage habits, sharing, drawbacks,…
Descriptors: Social Networks, Young Adults, Gender Differences, Bullying
Almohri, Hussain M. J. – ProQuest LLC, 2013
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Descriptors: Computer Security, Information Security, Risk, Computer Networks
Trabelsi, Zouheir; Al Matrooshi, Mohammed; Al Bairaq, Saeed; Ibrahim, Walid; Masud, Mohammad M. – Education and Information Technologies, 2017
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to students' daily lives). Particularly, information security education should reflect the current…
Descriptors: Telecommunications, Handheld Devices, Student Interests, Best Practices
Owens, Rodney – ProQuest LLC, 2013
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…
Descriptors: Computer Software, Risk, Handheld Devices, Information Technology
Zydney, Janet Mannheimer; Hooper, Simon – TechTrends: Linking Research and Practice to Improve Learning, 2015
Educators can use video to gain invaluable information about their students. A concern is that collecting videos online can create an increased security risk for children. The purpose of this article is to provide ethical and legal guidelines for designing video-based apps for mobile devices and the web. By reviewing the literature, law, and code…
Descriptors: Video Technology, Computer Software, Computer System Design, Design Requirements
Hopkins, Liza; Wadley, Greg; Vetere, Frank; Fong, Maria; Green, Julie – Australian Journal of Education, 2014
Reduced school attendance is a recognised risk factor for poorer outcomes both educationally and across a wide range of social, economic and personal indicators throughout life. Children and young people with chronic health conditions often have poor or disrupted records of school attendance due to periods of hospitalisation and time spent…
Descriptors: Technology Integration, Hospitalized Children, Elementary School Students, At Risk Students
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Association Supporting Computer Users in Education, 2017
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Computer Software, Conferences (Gatherings)
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges