Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Security | 5 |
| Information Technology | 5 |
| Knowledge Management | 5 |
| Internet | 3 |
| Models | 3 |
| Risk | 3 |
| Active Learning | 2 |
| Benchmarking | 2 |
| Blended Learning | 2 |
| Clinical Diagnosis | 2 |
| Computer Science Education | 2 |
| More ▼ | |
Author
| Conley-Ware, Lakita D. | 1 |
| Dixit, R. K. | 1 |
| Isias, Pedro, Ed. | 1 |
| Issa, Theodora, Ed. | 1 |
| Issa, Tomayess, Ed. | 1 |
| Kommers, Piet, Ed. | 1 |
| Lamb, Christopher J. | 1 |
| McKay, Elspeth, Ed. | 1 |
Publication Type
| Collected Works - Proceedings | 2 |
| Dissertations/Theses -… | 2 |
| Collected Works - Serial | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
| Adult Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Lamb, Christopher J. – ProQuest LLC, 2013
The Advanced Persistent Threat (APT) presents an ever present and more growing threat to organizations across the globe. Traditional Information Technology (IT) incident response falls short in effectively addressing this threat. This researcher investigated the use of single-loop and double-loop learning in two organizations with internal…
Descriptors: Learning, Case Studies, Information Technology, Computer Security
Conley-Ware, Lakita D. – ProQuest LLC, 2010
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Descriptors: Crime, Terrorism, Identification, Computer Security
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology

Direct link
