Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 5 |
Computer System Design | 5 |
Database Management Systems | 5 |
Database Design | 3 |
Educational Technology | 2 |
Information Management | 2 |
Information Policy | 2 |
Integrity | 2 |
Performance Technology | 2 |
Barriers | 1 |
Best Practices | 1 |
More ▼ |
Source
Higher Education Studies | 1 |
IEEE Transactions on Learning… | 1 |
Online Journal of Distance… | 1 |
ProQuest LLC | 1 |
Author
Alier, Marc | 1 |
Altun, Halis | 1 |
Brown, Victoria | 1 |
Edwards, Gregory | 1 |
Fabregat-Gesa, R. | 1 |
Geng, Lihua | 1 |
Haddad, Hatem | 1 |
Kaiiali, Mustafa | 1 |
Marzo-Lazaro, J. L. | 1 |
Ozkaya, Armagan | 1 |
Verdu-Carbo, T. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 4 |
Journal Articles | 3 |
Dissertations/Theses -… | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Adult Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Spain | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Geng, Lihua – Higher Education Studies, 2011
In the process of textbook management of universities, the flow of storage, collection and check of textbook is quite complicated and daily management flow and system also seriously constrains the efficiency of the management process. Thus, in order to combine the information management model and the traditional management model, it is necessary…
Descriptors: Management Information Systems, Information Management, Database Design, Database Management Systems
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Marzo-Lazaro, J. L.; Verdu-Carbo, T.; Fabregat-Gesa, R. – 1998
This paper describes a solution to the user identification and tracking problem within an educational World Wide Web environment. The paper begins with an overview of the Teaching Support System project at the University of Girona (Spain); the main objective of the project is to create an integrated set of tools for teachers to use to create and…
Descriptors: Computer Interfaces, Computer Security, Computer Software Development, Computer System Design