Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Software | 10 |
Information Technology | 10 |
Prevention | 10 |
Computer Security | 4 |
Computer Networks | 3 |
Computer Peripherals | 3 |
Teacher Attitudes | 3 |
Teaching Methods | 3 |
Cheating | 2 |
Computer Science Education | 2 |
Computers | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
British Journal of… | 1 |
Education and Information… | 1 |
International Society for… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Educational… | 1 |
Online Submission | 1 |
Author
Akcay, Hakan, Ed. | 1 |
Budimac, Zoran | 1 |
Chen, Min | 1 |
Chou, Te-Shun | 1 |
Crossman, Katherine | 1 |
Eaton, Sarah Elaine | 1 |
Edino, Rachael | 1 |
Hempenius, Nicholas | 1 |
Ivanovic, Mirjana | 1 |
Kanthimathi, S. | 1 |
Keating, Joseph, Comp. | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 3 |
Books | 1 |
Collected Works - Proceedings | 1 |
Reference Materials -… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Education | 2 |
Secondary Education | 2 |
Grade 8 | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Audience
Students | 2 |
Teachers | 2 |
Administrators | 1 |
Policymakers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chen, Min; Zhou, Chi; Wang, Yiming; Li, Yating – Education and Information Technologies, 2022
Understanding the factors related to teacher burnout can support school administrators and teachers in optimizing the direction of school development and reducing teacher burnout. This study investigated the impact of school information and communication technology (ICT) construction and teacher information literacy on teacher burnout and explored…
Descriptors: Teacher Burnout, Information Technology, Structural Equation Models, Information Literacy
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Eaton, Sarah Elaine; Crossman, Katherine; Edino, Rachael – Online Submission, 2019
Purpose: This report documents research and related materials related to academic integrity in Canada to inform and guide future work in the field. It provides an overview of the literature up to and including 2017 relating to academic integrity in Canada. Methods: Two research questions guided this literature review: 1. What scholarly, research,…
Descriptors: Integrity, Databases, Teaching Methods, Professional Education
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Owens, Rodney – ProQuest LLC, 2013
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…
Descriptors: Computer Software, Risk, Handheld Devices, Information Technology
Roumani, Yaman – ProQuest LLC, 2012
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Descriptors: Computer Software, Risk, Computer Security, Information Technology
Shelley, Mack, Ed.; Akcay, Hakan, Ed.; Ozturk, Omer Tayfur, Ed. – International Society for Technology, Education, and Science, 2022
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on March 24-27, 2022 in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, to discuss theoretical and…
Descriptors: Educational Technology, Technology Uses in Education, Computer Peripherals, Equipment
Pribela, Ivan; Ivanovic, Mirjana; Budimac, Zoran – British Journal of Educational Technology, 2009
This paper discusses Svetovid, cross-platform software that helps instructors to assess the amount of effort put into practical exercises and exams in courses related to computer programming. The software was developed as an attempt at solving problems associated with practical exercises and exams. This paper discusses the design and use of…
Descriptors: Computer Software, Prevention, Classroom Techniques, Student Behavior
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives
Rajendran, L.; Venkatesan, M.; Kanthimathi, S. – Journal of Educational Technology, 2005
Going digital is the way to minimize handling of damaged materials, but the imaging process is demanding and must be done with oversight by preservation staff and with a high enough level of quality to ensure the reusability of the archival electronic file for as long as possible. This paper focuses on the scope and needs of digital preservation,…
Descriptors: Electronic Libraries, Library Materials, Archives, Preservation