Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Networks | 11 |
Foreign Countries | 11 |
Information Security | 11 |
Information Technology | 3 |
Student Attitudes | 3 |
Universities | 3 |
Best Practices | 2 |
College Faculty | 2 |
College Students | 2 |
Computer Security | 2 |
Data Collection | 2 |
More ▼ |
Source
Author
Abdolahifard, Khadije | 1 |
Akhavan, Peyman | 1 |
Apuke, Oberiri Destiny | 1 |
Arefi, Majid Feyz | 1 |
Bakardjieva, Teodora | 1 |
Bell, Kevin R. | 1 |
Blanes, Ian | 1 |
Borrego, Carlos | 1 |
Claffy, K. C. | 1 |
Debiec, Piotr | 1 |
Dehghani, Ali | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 6 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 2 |
Tests/Questionnaires | 2 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 10 |
Audience
Location
Iran | 2 |
Australia | 1 |
Austria (Vienna) | 1 |
Bulgaria | 1 |
Cameroon | 1 |
Europe | 1 |
Kenya | 1 |
Nigeria | 1 |
South Africa (Cape Town) | 1 |
Spain (Barcelona) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Dogari, Kwase Andu; Apuke, Oberiri Destiny – Turkish Online Journal of Distance Education, 2019
The discussion and debate on integrating social media into the formal education remain largely speculative rather than well informed and certain. Only limited studies and mainly from developed nations attempted to describe specific learning gains and benefits of social media as a formal tool in the learning environment. Studies that attempt to…
Descriptors: Social Media, Cooperative Learning, Foreign Countries, Teaching Methods
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Zseby, Tanja; Iglesias Vázquez, Félix; King, Alistair; Claffy, K. C. – IEEE Transactions on Education, 2016
This paper presents a network security laboratory project for teaching network traffic anomaly detection methods to electrical engineering students. The project design follows a research-oriented teaching principle, enabling students to make their own discoveries in real network traffic, using data captured from a large IP darkspace monitor…
Descriptors: Teaching Methods, Information Security, Information Networks, Computer Networks
Nedyalkova, Anna; Bakardjieva, Teodora; Nedyalkov, Krasimir – International Association for Development of the Information Society, 2016
This paper suggests digital approaches in university management. Digital transformation requires leadership that can maintain and balance competing interests from faculty, administrators, students and others. The team of Varna Free University designed a flexible proper solution VFU SMART STUDENT aiming at lower operating costs and better…
Descriptors: Information Security, Information Systems, Computer Networks, Guidelines
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities
Mosalanejad, Leili; Dehghani, Ali; Abdolahifard, Khadije – Turkish Online Journal of Distance Education, 2014
Cyber ethics is the philosophical study of ethics pertaining to computer networks encompassing users' behavior, what networked computers are programmed to do, and how this affects the individuals and the society. This study aimed to investigate the students' experiences of ethics in cyber systems.In the present study, the researchers conducted…
Descriptors: Student Experience, Ethics, Online Systems, Phenomenology
Akhavan, Peyman; Arefi, Majid Feyz – Interdisciplinary Journal of E-Learning and Learning Objects, 2014
The purpose of this study is to obtain suitable quality criteria for evaluation of electronic content for virtual courses. We attempt to find the aspects which are important in developing e-content for virtual courses and to determine the criteria we need to judge for the quality and efficiency of learning objects and e-content. So we can classify…
Descriptors: Electronic Learning, Classification, Educational Technology, Course Content