NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Community1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mazlina Abdul Majid; Husnul Ajra; Mohammad Adam Ibrahim Fakhreldin; Md. Shohidul Islam; Khalid Adam Ismail Hammad – International Society for Technology, Education, and Science, 2023
One of the most persuasive technologies in developing universities' smart campus applications is the Internet of Things (IoT) technique. Deploying thousands of readily available devices connected to IoT systems by ignoring device vulnerabilities and threat strategies in smart campus infrastructure is exacerbating security challenges. Moreover,…
Descriptors: Educational Technology, Technology Uses in Education, Computer Security, Technological Literacy
Business-Higher Education Forum, 2019
"Creating Purposeful Partnerships" offers insights into business-led regional talent ecosystems that facilitate access, alignment, and development of a prepared workforce with the skills necessary for companies' long-term success. The findings of this report serve as a playbook for CEOs and their executive teams for establishing…
Descriptors: Partnerships in Education, School Business Relationship, Higher Education, Teamwork
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Teixeira, Claudio; Pinto, Joaquim Sousa; Martins, Joaquim Arnaldo – Campus-Wide Information Systems, 2008
Purpose: The aim of this paper is to describe a project to provide an online web portal that can be used as a front-end for all university users--students, teachers, staff--and services, library, administration, e-learning, and e-mail. Design/methodology/approach: The profile model proposed is mainly inheritable, defined by profile components with…
Descriptors: Information Systems, Profiles, Internet, Web Sites
Peer reviewed Peer reviewed
Furnell, S. M.; Onions, P. D.; Bleimann, U.; Gojny, U.; Knahl, M.; Roder, H. F.; Sanders, P. W. – Internet Research, 1998
Presents a generic reference model for online distance learning and discusses security issues for each stage (enrollment, study, completion, termination, suspension). Discusses a security framework (authentication and accountability, access control, intrusion detection, network communications, nonrepudiation, learning resources provider…
Descriptors: Accountability, Alarm Systems, Computer Mediated Communication, Computer Security
Shih, Timothy; Hung, Jason – Information Science Publishing, 2007
Future Directions in Distance Learning and Communication Technologies presents theoretical studies and practical solutions for engineers, educational professionals, and graduate students in the research areas of e-learning, distance education, and instructional design. This book provides readers with cutting-edge solutions and research directions…
Descriptors: Electronic Learning, Distance Education, Instructional Design, Privacy
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers