Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Ethics | 4 |
Risk | 4 |
Computer Science Education | 2 |
Electronic Learning | 2 |
Foreign Countries | 2 |
Information Security | 2 |
Learning Experience | 2 |
Student Attitudes | 2 |
Universities | 2 |
Accountability | 1 |
More ▼ |
Author
Adil Jeghal | 1 |
Ali Yahyaouy | 1 |
Alkaabi, Shamma | 1 |
Bhunia, Swarup | 1 |
El Sayed, Hesham | 1 |
Hajar Majjate | 1 |
Hamid Tairi | 1 |
Khalid Alaoui Zidani | 1 |
Khan, Manzoor Ahmed | 1 |
Merabet, Adel | 1 |
Paul, Shubhra Deb | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Administrators | 1 |
Policymakers | 1 |
Location
Florida | 1 |
Morocco | 1 |
United Arab Emirates | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
White, Lawrence – Association of Governing Boards of Universities and Colleges, 2015
A principle responsibility of a board member is to understand the environment in which his or her institution operates. Today, that environment includes a host of legal risks that every institution of higher education must be prepared to assess and proactively address. Colleges and universities work to contain and manage those risks through such…
Descriptors: Legal Problems, Sexual Abuse, Student Behavior, Risk