Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 6 |
Database Management Systems | 6 |
Educational Technology | 6 |
Higher Education | 4 |
Computer Networks | 3 |
Computer Uses in Education | 3 |
Database Design | 3 |
Foreign Countries | 3 |
Programming | 3 |
Teaching Methods | 3 |
Barriers | 2 |
More ▼ |
Source
Discover Education | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
Online Journal of Distance… | 1 |
Online Submission | 1 |
Author
Baker, Elizabeth | 1 |
Basil Hanafi | 1 |
Brown, Victoria | 1 |
Devyaani Singh | 1 |
Fabregat-Gesa, R. | 1 |
Liu, Shijie | 1 |
Marzo-Lazaro, J. L. | 1 |
Mohammad Ali | 1 |
Reinicke, Bryan | 1 |
Ren, Zhanying | 1 |
Toothman, Callie | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks
Marzo-Lazaro, J. L.; Verdu-Carbo, T.; Fabregat-Gesa, R. – 1998
This paper describes a solution to the user identification and tracking problem within an educational World Wide Web environment. The paper begins with an overview of the Teaching Support System project at the University of Girona (Spain); the main objective of the project is to create an integrated set of tools for teachers to use to create and…
Descriptors: Computer Interfaces, Computer Security, Computer Software Development, Computer System Design
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers