Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 4 |
| Foreign Countries | 4 |
| Information Networks | 4 |
| Information Technology | 3 |
| Telecommunications | 2 |
| Access to Information | 1 |
| Comparative Analysis | 1 |
| Computer Mediated… | 1 |
| Computer Networks | 1 |
| Decision Making | 1 |
| Electronic Learning | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 2 |
| Books | 1 |
| Collected Works - General | 1 |
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Australia | 1 |
| Oman | 1 |
| South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hajar Rashid AlKalbani; Kamla Ali Al-Busaidi – Education and Information Technologies, 2025
This study aims to develop an integrated framework for the security of e-learning systems. As a main knowledge management system (KMS) in higher education institutions, the security of the e-learning system is critical. The literature indicated that inadequate security measures make it difficult for e-learning systems to fend off cyberattacks.…
Descriptors: Foreign Countries, Higher Education, Information Technology, Electronic Learning
Gregory, Mark A; Cradduck, Lucy – International Association for Development of the Information Society, 2016
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Descriptors: Foreign Countries, Computer Security, Telecommunications, National Security
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Institute for Information Studies, Queenstown, MD. – 1999
This collection of commissioned papers provides a variety of perspectives on the impact of global information networks. The following articles are included: "The Promise of Global Networks: An Introduction" (Jorge Reina Schement); "Architecture and Expectations: Networks of the World--Unite!" (Marjory S. Blumenthal); "The…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Security

Peer reviewed
Direct link
