Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Science | 4 |
Computer Security | 4 |
Information Systems | 4 |
Information Technology | 4 |
Computer Networks | 2 |
Telecommunications | 2 |
Access to Computers | 1 |
Action Research | 1 |
Adults | 1 |
Advanced Courses | 1 |
Assignments | 1 |
More ▼ |
Author
Bhagyavati | 1 |
Caudle, Daryl L. | 1 |
McIntyre, Joshua | 1 |
San Nicolas-Rocca, Tonia | 1 |
Serapiglia, Anthony | 1 |
Serapiglia, Constance | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 2 |
Audience
Location
District of Columbia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Caudle, Daryl L. – ProQuest LLC, 2010
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Descriptors: Information Systems, Organizational Change, Telecommunications, Information Technology
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses