Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 8 |
Higher Education | 8 |
Information Dissemination | 8 |
Access to Information | 4 |
Barriers | 3 |
Computer Mediated… | 3 |
Computers | 3 |
Educational Technology | 3 |
Handheld Devices | 3 |
Information Technology | 3 |
Telecommunications | 3 |
More ▼ |
Source
International Association for… | 3 |
Academe: Bulletin of the AAUP | 1 |
Association of Governing… | 1 |
CURRENTS | 1 |
Chronicle of Higher Education | 1 |
Author
Basken, Paul | 1 |
Briden, Judi | 1 |
Capus, Laurence | 1 |
Davida, George I. | 1 |
Hart, Kevin | 1 |
Inmaculada Arnedillo Sánchez,… | 1 |
Mohanna, Mahmoud | 1 |
Pedro Isaías, Editor | 1 |
Piet Kommers, Editor | 1 |
Reeb, Brenda | 1 |
Zhang, Allison | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 4 |
Journal Articles | 3 |
Collected Works - Proceedings | 2 |
Speeches/Meeting Papers | 2 |
Books | 1 |
Numerical/Quantitative Data | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Location
Brazil | 2 |
Estonia | 2 |
Greece | 2 |
Italy | 2 |
Massachusetts | 2 |
Philippines | 2 |
Portugal | 2 |
United Kingdom | 2 |
Asia | 1 |
Australia | 1 |
Connecticut | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Association of Governing Boards of Universities and Colleges, 2020
The Association of Governing Boards of Universities and Colleges (AGB) 2020 Trustee Index is the third annual survey of governing board members regarding matters imperative to the higher education sector, as well as to the colleges, universities, and multicampus systems they hold in trust. This AGB survey, conducted in collaboration with Gallup,…
Descriptors: Governing Boards, Trustees, Professional Associations, Governance
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services
Mohanna, Mahmoud; Capus, Laurence – International Association for Development of the Information Society, 2013
This paper presents a mobile learning application for a learning course at higher education level. Based on the RSS feed technology, the presented mobile application establishes an in-time communication channel between the instructor and his/her students to keep them up-to-date with all course important dates, instructions and information in…
Descriptors: Technology Uses in Education, Educational Technology, Electronic Learning, Telecommunications
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Hart, Kevin – CURRENTS, 2010
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Descriptors: Higher Education, Computer Security, Barriers, Confidentiality

Davida, George I. – Academe: Bulletin of the AAUP, 1981
The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)
Descriptors: Academic Freedom, Computer Security, Computers, Cryptography
Briden, Judi; Reeb, Brenda; Zhang, Allison – 1997
The Electronic Resources Team at the University of Rochester (New York) River Campus Libraries pursued the concept of one-stop shopping as a component of their new integrated library system Voyager, which debuted in January 1997. Faced with a growing variety of electronic resources with no single guide to their existence and access, the Team dealt…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers