NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Jennifer Saunders, Rapporteur; Steven Kendall, Rapporteur; U.S. Science and Innovation Policy, Contributor; Policy and Global Affairs, Contributor – National Academies Press, 2025
In recent years, concerns have grown about foreign actors exploiting the openness of the U.S. research ecosystem to misappropriate scientific and technological information to enhance their nations' scientific, economic, and military capabilities. Research security requirements for academic institutions currently include research security training,…
Descriptors: Higher Education, Educational Research, Information Security, Foreign Policy
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security