Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 5 |
Foreign Countries | 5 |
National Security | 5 |
Federal Legislation | 2 |
Global Approach | 2 |
Privacy | 2 |
Voting | 2 |
Academic Achievement | 1 |
Academic Persistence | 1 |
Affirmative Action | 1 |
Animals | 1 |
More ▼ |
Source
Chronicle of Higher Education | 2 |
Cogent Education | 1 |
International Association for… | 1 |
Quarterly Journal of Speech | 1 |
Author
Abdulfattah Omar | 1 |
Cradduck, Lucy | 1 |
Gregory, Mark A | 1 |
Hartnett, Stephen John | 1 |
Tahani Abdullah Abdurhman… | 1 |
Waheed M. A. Altohami | 1 |
Publication Type
Journal Articles | 3 |
Collected Works - Serial | 2 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Adult Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 2 |
Teachers | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tahani Abdullah Abdurhman Alhumud; Abdulfattah Omar; Waheed M. A. Altohami – Cogent Education, 2023
Cybersecurity systems are crucial for safeguarding information assets across various sectors, including government, military, and commercial domains. In Saudi Arabia, cybersecurity has gained significant importance within the national security strategy, resulting in substantial investments in technologies to protect information assets, combat…
Descriptors: Information Security, Computer Security, Universities, Total Quality Management
Gregory, Mark A; Cradduck, Lucy – International Association for Development of the Information Society, 2016
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Descriptors: Foreign Countries, Computer Security, Telecommunications, National Security
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for colleges and university faculty members and administrators. This April 23, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Academe Must Work with the Intelligence Community" (Rindskopf, Elizabeth); (2) "Masked and Explicated:…
Descriptors: National Security, Scientific Research, Musicians, Affirmative Action
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This October 8, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Game for Anything" (Ruggill, Judd Ethan; Neelakantan, Shailaja); (2)…
Descriptors: Part Time Faculty, Teacher Employment Benefits, Drinking, Standardized Tests