Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 10 |
Since 2016 (last 10 years) | 14 |
Since 2006 (last 20 years) | 18 |
Descriptor
Computer Software | 18 |
Information Management | 18 |
Information Security | 18 |
Information Storage | 10 |
Information Technology | 8 |
Internet | 8 |
Delivery Systems | 7 |
Computers | 6 |
Users (Information) | 6 |
Computer Security | 5 |
Educational Technology | 5 |
More ▼ |
Source
Author
Amy J. Connolly | 1 |
Babin, Ron | 1 |
Balaji, Venkataraman | 1 |
Beuran, Razvan | 1 |
Buckman, Joel | 1 |
Carlos Novo | 1 |
Cummings, Jeffrey | 1 |
Czuprynski, Christine N. | 1 |
Daniel E. Rush | 1 |
Enamait, John D. | 1 |
Gold, Stephanie | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Research | 7 |
Reports - Descriptive | 5 |
Guides - Non-Classroom | 3 |
Dissertations/Theses -… | 2 |
Tests/Questionnaires | 2 |
Books | 1 |
Information Analyses | 1 |
Reports - General | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 6 |
Elementary Secondary Education | 3 |
Audience
Policymakers | 2 |
Media Staff | 1 |
Researchers | 1 |
Teachers | 1 |
Location
Canada | 2 |
Australia | 1 |
Belgium | 1 |
Bermuda | 1 |
California (Fresno) | 1 |
Canada (London) | 1 |
Canada (Toronto) | 1 |
Chile | 1 |
Czech Republic | 1 |
Denmark | 1 |
Finland | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Hassan Mallam Ibrahim; Kamsuriah Ahmad; Hasimi Sallehudin – Education and Information Technologies, 2025
As the need for digital content increases almost daily, preserving this content for university libraries, especially in the least developed and developing nations, becomes a challenge, resulting in the loss of this data. Even though most of these libraries are automated and adopt one digital preservation strategy or the other, library users need…
Descriptors: Preservation, Technology Uses in Education, Research Libraries, Internet
Raza, Syed Ali; Khan, Komal Akram – Interactive Technology and Smart Education, 2022
Purpose: Collaboration, communication, critical thinking and creativity are the most essential Cs of education. However, at present, these Cs are interlinked with technology to make it more effective and reliable. Educational technology infuses higher education, many people use it on a daily basis. Students are eager to adopt such technologies…
Descriptors: Academic Achievement, Educational Technology, Higher Education, Internet
Singh, Jewan; Mansotra, Vibhakar; Mir, Shabir Ahmad; Parveen, Shahzada – Education and Information Technologies, 2021
Nowadays Cloud computing technology is considered pivotal for the success of any business or organisation. This technology is not just an infrastructure that is used to implement various strategies rather it makes new emerging strategies possible. However, to embrace this emerging technology, the challenges and uncertainties about the expected…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Internet
Beuran, Razvan; Tang, Dat; Tan, Zheyu; Hasegawa, Shinobu; Tan, Yasuo; Shinoda, Yoichi – Education and Information Technologies, 2019
Cybersecurity education and training are being conducted on an ever-increasing scale, as most organizations need to improve their readiness in dealing with the more and more frequent cyberattacks. However, most systems used for such education and training purposes are built from scratch, are highly customized, and often proprietary. This is true…
Descriptors: Information Security, Teaching Methods, Management Systems, Information Systems
Grech, Alex; Balaji, Venkataraman; Miao, Fengchun – Commonwealth of Learning, 2022
Blockchain is a verification infrastructure that offers a solution to the problem of how to verify digital identity. This publication is aimed at policy-makers in education who have an interest in understanding the affordances of blockchain technology to the education sector. Exploratory exercises with blockchain demonstrate that it is already…
Descriptors: Technology Uses in Education, Information Management, Information Security, Information Storage
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Janicki, Thomas; Cummings, Jeffrey – Information Systems Education Journal, 2022
As the skills and competencies needed by Information Systems (IS) undergraduates continues to grow, various IS professional societies have developed recommendations which are updated on a periodic basis. These recommendations known as 'model curricula' are a guide for faculty and institutions to consider when developing or evaluating the…
Descriptors: Information Science Education, Information Systems, Computer Software, Undergraduate Students
Babin, Ron; Halilovic, Branka – Information Systems Education Journal, 2017
The use of cloud computing services has grown dramatically in post-secondary institutions in the last decade. In particular, universities have been attracted to the low-cost and flexibility of acquiring cloud software services from Google, Microsoft and others, to implement e-mail, calendar and document management and other basic office software.…
Descriptors: Internet, Computer Software, Information Management, Educational Technology
Council of the Great City Schools, 2017
Equipping today's children with 21st century skills for the digital age requires turning traditional classrooms into a digital-learning ecosystem and ensuring teachers have professional skills and unfettered access to tools they need for 21st century teaching and learning. School district networks are being used for instruction, business, and…
Descriptors: Information Security, Educational Technology, Information Management, Networks
Enamait, John D. – ProQuest LLC, 2012
Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…
Descriptors: Information Security, Computer Software, Information Management
Previous Page | Next Page ยป
Pages: 1 | 2