Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 8 |
Foreign Countries | 8 |
Global Approach | 8 |
Elementary Secondary Education | 4 |
Information Technology | 4 |
Electronic Learning | 3 |
Privacy | 3 |
Access to Computers | 2 |
Artificial Intelligence | 2 |
Barriers | 2 |
Books | 2 |
More ▼ |
Source
International Association for… | 2 |
Chronicle of Higher Education | 1 |
International Society for… | 1 |
Journal of Cybersecurity… | 1 |
ProQuest LLC | 1 |
Quarterly Journal of Speech | 1 |
World Journal on Educational… | 1 |
Author
Bencheva, Nina | 1 |
Cradduck, Lucy | 1 |
Gregory, Mark A | 1 |
Grindei, Laura | 1 |
Grout, Ian | 1 |
Hartnett, Stephen John | 1 |
Jackson, Noel | 1 |
Ligusova, Jana | 1 |
Mack Shelley, Editor | 1 |
Naaji, Antoanela | 1 |
Omer Tayfur Ozturk, Editor | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Collected Works - Proceedings | 2 |
Reports - Evaluative | 2 |
Books | 1 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 4 |
Elementary Secondary Education | 3 |
Postsecondary Education | 3 |
Adult Education | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
United States | 3 |
Australia | 2 |
China | 2 |
United Kingdom (England) | 2 |
Algeria | 1 |
Asia | 1 |
Brazil | 1 |
Bulgaria | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Gregory, Mark A; Cradduck, Lucy – International Association for Development of the Information Society, 2016
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Descriptors: Foreign Countries, Computer Security, Telecommunications, National Security
Mack Shelley, Editor; Omer Tayfur Ozturk, Editor – International Society for Technology, Education, and Science, 2024
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on April 27-30, 2024, in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, discuss theoretical and…
Descriptors: STEM Education, Second Language Learning, Second Language Instruction, English (Second Language)
White, Kerry-Ann – ProQuest LLC, 2012
Given the lack of computer diffusion studies in the Caribbean, and coupled with the necessity to understand Jamaica in efforts to get a clearer global representation of the digital divide, this study takes an exploratory approach and examines the differences of the computer technology adoption and diffusion attitudes and viewpoints between the…
Descriptors: Foreign Countries, Educational Technology, Information Technology, Technology Integration
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This November 5, 2004 issue of "Chronicle for Higher Education" includes the following articles: (1) "Measure Professor's Real Service, Not Lip Service" (Furman, Andrew);…
Descriptors: Faculty Evaluation, Psychiatry, Television, Innovation
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers