Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 27 |
Descriptor
Computer System Design | 28 |
Information Security | 28 |
Computer Security | 12 |
Information Technology | 12 |
Foreign Countries | 8 |
Computer Software | 7 |
Access to Information | 6 |
Educational Technology | 6 |
Privacy | 6 |
Usability | 6 |
Computer Interfaces | 5 |
More ▼ |
Source
Author
AL Faresi, Ahmed | 1 |
Abu-Al-Aish, Ahmad | 1 |
Ahadi Haji Mohd Nasir | 1 |
Alawneh, John | 1 |
Alier, Marc | 1 |
Altun, Halis | 1 |
An, Ho | 1 |
Breslin, John | 1 |
Bultmann, Mareike | 1 |
Campbell, Jackie | 1 |
Chatti, Mohamed Amine | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 13 |
Postsecondary Education | 12 |
Elementary Secondary Education | 3 |
Adult Education | 1 |
Audience
Policymakers | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Higher Education Act 1965 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Hinchman, David B. – US Government Accountability Office, 2022
The COVID-19 pandemic forced schools across the nation to increase their reliance on IT to deliver educational instruction to students. This amplified the vulnerability of K-12 schools to potentially serious cyberattacks. The US Government Accountability Office (GAO) was asked to review cybersecurity in K-12 schools. The objectives of this report…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Government Role
Ahadi Haji Mohd Nasir; Ely Salwana; Mohammad Nazir Ahmad – Journal of Information Technology Education: Innovations in Practice, 2025
Aim/Purpose: This paper addresses the lack of a standardized approach to information dashboard design and the absence of integrated Information Governance (IG) principles in this context. Background: This study addresses the critical role of IG principles in ensuring dashboards are reliable, secure, and effective. By integrating IG principles into…
Descriptors: Information Management, Information Policy, Information Dissemination, Information Systems
Abu-Al-Aish, Ahmad – International Journal of Information and Communication Technology Education, 2021
Mobile learning (m-learning) has become an increasingly attractive solution for schools and universities that utilize new technologies in their teaching and learning setting. This study investigates the technical factors affecting the development of m-learning applications services from students' perspectives. It presents a model consisting of…
Descriptors: Computer Oriented Programs, Handheld Devices, Technology Uses in Education, Foreign Countries
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Chaudhry, Hina – ProQuest LLC, 2013
This study is a part of the smart grid initiative providing electric vehicle charging infrastructure. It is a refueling structure, an energy generating photovoltaic system and charge point electric vehicle charging station. The system will utilize advanced design and technology allowing electricity to flow from the site's normal electric service…
Descriptors: Energy, Motor Vehicles, Computer System Design, Information Technology
Zydney, Janet Mannheimer; Hooper, Simon – TechTrends: Linking Research and Practice to Improve Learning, 2015
Educators can use video to gain invaluable information about their students. A concern is that collecting videos online can create an increased security risk for children. The purpose of this article is to provide ethical and legal guidelines for designing video-based apps for mobile devices and the web. By reviewing the literature, law, and code…
Descriptors: Video Technology, Computer Software, Computer System Design, Design Requirements
Canadian Association of University Teachers, 2015
Increasingly, university and college administrators are contracting out their institutions' operational information technology (IT) needs. Specifically, this means moving from an IT system with a server based at the institution with an in house IT support staff to a cloud based system outside the institution where most of the staff resources are…
Descriptors: Outsourcing, Information Technology, Universities, Privacy
Takabi, Hassan – ProQuest LLC, 2013
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Descriptors: Computer System Design, Semantics, Information Security, Information Policy
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
Cole, Robert – ProQuest LLC, 2013
Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…
Descriptors: Bayesian Statistics, Information Systems, Computer Security, Information Security
An, Ho – ProQuest LLC, 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Descriptors: Confidentiality, Information Security, Resource Allocation, Computer System Design
Langley-Turnbaugh, S. J.; Shehata, T. – Research Management Review, 2015
The University of Southern Maine (USM) designed and implemented an internal Research Cluster Seed Fund competition with the goals of building USM faculty expertise to address industry and community needs, deepening the impact of research through an interdisciplinary approach to solving problems, and leveraging external funding to sustain…
Descriptors: Undergraduate Students, Competition, Research Proposals, Partnerships in Education
Vaniea, Kami – ProQuest LLC, 2012
Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…
Descriptors: Access to Information, Information Security, Computer Interfaces, Computer System Design
Tadesse, Yohannes – ProQuest LLC, 2012
The importance of information security has made many organizations to invest and utilize effective information security controls within the information systems (IS) architecture. An organization's strategic decisions to secure enterprise-wide services often associated with the overall competitive advantages that are attained through the process of…
Descriptors: Information Security, Computer System Design, Information Systems, Information Technology
Previous Page | Next Page ยป
Pages: 1 | 2