Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Security | 5 |
| Information Security | 5 |
| Synchronous Communication | 5 |
| COVID-19 | 2 |
| Computational Linguistics | 2 |
| Computer Software | 2 |
| Data Collection | 2 |
| Distance Education | 2 |
| Educational Technology | 2 |
| English (Second Language) | 2 |
| Evaluation Methods | 2 |
| More ▼ | |
Author
| Christine Wildman | 1 |
| Liu, Anyi | 1 |
| Mavis Morton | 1 |
| Mbaziira, Alex Vincent | 1 |
| Paula C. Barata | 1 |
| Seepersaud, Deborah, Ed. | 1 |
| Simonson, Michael, Ed. | 1 |
| Smith, Peter, Ed. | 1 |
| Tanja Samardzic | 1 |
Publication Type
| Collected Works - Proceedings | 2 |
| Dissertations/Theses -… | 2 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
| Adult Education | 1 |
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
| Two Year Colleges | 1 |
Audience
Location
| Canada | 1 |
| China | 1 |
| Florida | 1 |
| Georgia | 1 |
| Indiana | 1 |
| Kentucky | 1 |
| Maryland | 1 |
| New Jersey | 1 |
| North Carolina | 1 |
| Ohio | 1 |
| Virginia | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information

Peer reviewed
Direct link
