Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Networks | 11 |
Data Collection | 11 |
Information Technology | 11 |
Computer Security | 5 |
College Students | 4 |
Computer Software | 4 |
Evaluation Methods | 4 |
Foreign Countries | 4 |
Privacy | 4 |
Access to Information | 3 |
Higher Education | 3 |
More ▼ |
Source
Information Systems Education… | 2 |
CAUSE/EFFECT | 1 |
Development Communication… | 1 |
EDUCAUSE | 1 |
Interdisciplinary Journal of… | 1 |
International Association for… | 1 |
Journal of Interactive… | 1 |
ProQuest LLC | 1 |
Author
Almeroth, Kevin | 1 |
Hawkins, Brian L. | 1 |
Howard, Elizabeth V. | 1 |
Koc, Levent | 1 |
Lynch, Clifford | 1 |
McIntyre, Joshua | 1 |
Morell, Jonathan A. | 1 |
Rudy, Julia A. | 1 |
Serapiglia, Anthony | 1 |
Serapiglia, Constance | 1 |
Tanner, Maureen | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Administrators | 1 |
Practitioners | 1 |
Researchers | 1 |
Location
Ohio | 2 |
United States | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Morell, Jonathan A.; And Others – 1987
A framework for assessing the implementation and impact of office automation (OA) technology within shore-based facilities of the U.S. Navy is provided. Following a list of the assumptions guiding the evaluation plan, a model for data collection is presented which is based on the perspective of a work group, i.e., a small number of individuals who…
Descriptors: Change Strategies, Computer Networks, Data Collection, Evaluation Methods
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Lynch, Clifford – CAUSE/EFFECT, 1998
Describes access management problems associated with networked information systems and the two major architectural approaches used to address them, including discussion of related policy issues such as privacy, accountability, and collection of management data. Focus is on the concerns of colleges and universities and on developing practical…
Descriptors: Access to Information, Accountability, Administrative Policy, College Administration
International Federation of Library Associations, The Hague (Netherlands). – 1990
The eight papers in this collection were presented at the meetings of three sections of the Division of Management and Technology: (1) "Distributed Intelligence in Library Systems: Prospects and Problems" (S. Michael Malinconico); (2) "Library Cooperation Based on Information Technology Networks: A Vision for a European Library Future" (Morten…
Descriptors: Archives, Audiovisual Aids, Computer Networks, Data Collection
Development Communication Report, 1991
The four 1991 issues of the newsletter "Development Communication Report" are primarily concerned with the use of communication technologies in developing countries to educate the people. Evaluation is the theme of the first issue, which contains the following articles: "Evaluating Communication Programs: Means and Ends,""Making a Splash: How…
Descriptors: Acquired Immune Deficiency Syndrome, Community Involvement, Computer Networks, Data Collection
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers