Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Higher Education | 3 |
| Program Effectiveness | 3 |
| Information Security | 2 |
| Academic Freedom | 1 |
| Agency Cooperation | 1 |
| Best Practices | 1 |
| Comparative Analysis | 1 |
| Compliance (Legal) | 1 |
| Computer Science Education | 1 |
| Computer Software | 1 |
| More ▼ | |
Author
| Christopher D. Adams | 1 |
| Ghemri, Lila | 1 |
| Jennifer Saunders, Rapporteur | 1 |
| Policy and Global Affairs,… | 1 |
| Steven Kendall, Rapporteur | 1 |
| U.S. Science and Innovation… | 1 |
| Yuan, Shengli | 1 |
Publication Type
| Books | 1 |
| Collected Works - Proceedings | 1 |
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| China | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jennifer Saunders, Rapporteur; Steven Kendall, Rapporteur; U.S. Science and Innovation Policy, Contributor; Policy and Global Affairs, Contributor – National Academies Press, 2025
In recent years, concerns have grown about foreign actors exploiting the openness of the U.S. research ecosystem to misappropriate scientific and technological information to enhance their nations' scientific, economic, and military capabilities. Research security requirements for academic institutions currently include research security training,…
Descriptors: Higher Education, Educational Research, Information Security, Foreign Policy
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security

Direct link
Peer reviewed
