Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Information Security | 4 |
Integrity | 4 |
Cheating | 2 |
Computer System Design | 2 |
Artificial Intelligence | 1 |
Bias | 1 |
Bibliometrics | 1 |
Compliance (Legal) | 1 |
Computer Software | 1 |
Confidentiality | 1 |
More ▼ |
Author
Alier, Marc | 1 |
Altun, Halis | 1 |
Haddad, Hatem | 1 |
Huiling Ma | 1 |
Kaiiali, Mustafa | 1 |
Kevin Dennis | 1 |
Lilliati Ismail | 1 |
Ozkaya, Armagan | 1 |
Weijing Han | 1 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Higher Education Act 1965 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kevin Dennis – ProQuest LLC, 2024
The first step to improving an organization's security posture is to define the organization's security goals. At a technical level, these goals are expressed as security policies. Security policies are predicates over programs, that return true or false if the program adheres to the policy. Defining these policies correctly is thus essential to…
Descriptors: Information Security, Computer Security, Policy, Integrity
Huiling Ma; Lilliati Ismail; Weijing Han – Education and Information Technologies, 2024
The advancement and application of Artificial Intelligence (AI) has introduced innovative changes in language learning and teaching. In particular, the widespread utilization of various chatbots as foreign language learning partners showcases their remarkable potential contribution to the field. Nevertheless, there are currently few studies that…
Descriptors: Bibliometrics, Artificial Intelligence, Computer Software, Second Language Learning
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
WCET, 2008
Much attention has been focused on the accountability, student learning outcomes, transfer of credit, and illegal file sharing provisions of the two related bills that have moved through the U.S. Senate and the House of Representatives to amend and extend the provisions of the 1965 Higher Education Act (S. 1642 and H.R. 4137). One of the…
Descriptors: Higher Education, Educational Technology, Distance Education, Integrity