Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 16 |
Descriptor
Computer Security | 21 |
Information Technology | 21 |
Web Sites | 21 |
Internet | 16 |
Computer Software | 9 |
Educational Technology | 9 |
Privacy | 8 |
Higher Education | 7 |
Computer Networks | 6 |
Online Courses | 6 |
Computer Uses in Education | 5 |
More ▼ |
Source
Author
Blazer, Christie | 1 |
Borcea-Pfitzmann, Katrin | 1 |
Breeding, Marshall | 1 |
Cesarini, Paul | 1 |
Collins, Hilton | 1 |
Cordes, Christofer Sean | 1 |
Dixit, R. K. | 1 |
Gallant, David T. | 1 |
Gil-Garcia, J. Ramon | 1 |
He, Wu | 1 |
Ilci, Ahmet | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 11 |
Postsecondary Education | 7 |
Elementary Secondary Education | 5 |
Elementary Education | 3 |
Adult Education | 1 |
Early Childhood Education | 1 |
Grade 1 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Media Staff | 1 |
Practitioners | 1 |
Researchers | 1 |
Location
Pennsylvania | 3 |
Portugal | 3 |
Florida | 2 |
North Carolina | 2 |
Philippines | 2 |
United States | 2 |
Albania | 1 |
Arizona | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Lorenz, Anja; Borcea-Pfitzmann, Katrin – Interactive Technology and Smart Education, 2010
Purpose: Facing the dilemma between collaboration and privacy is a continual challenge for users. In this setting, the purpose of this paper is to discuss issues of a highly flexible role management integrated in a privacy-enhanced collaborative environment (PECE). Design/methodology/approach: The general framework was provided by former findings…
Descriptors: Cooperation, Interaction, Data, Role
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Blazer, Christie – Research Services, Miami-Dade County Public Schools, 2009
More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…
Descriptors: Web Sites, Social Networks, Information Technology, Internet
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Teixeira, Claudio; Pinto, Joaquim Sousa; Martins, Joaquim Arnaldo – Campus-Wide Information Systems, 2008
Purpose: The aim of this paper is to describe a project to provide an online web portal that can be used as a front-end for all university users--students, teachers, staff--and services, library, administration, e-learning, and e-mail. Design/methodology/approach: The profile model proposed is mainly inheritable, defined by profile components with…
Descriptors: Information Systems, Profiles, Internet, Web Sites
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Cordes, Christofer Sean – EDUCAUSE Quarterly, 2005
Spyware is the general term that describes a collection of technologies that help external parties in "gathering information about a person or organization without their knowledge." In addition to the minor annoyances spyware generates, such as redirected pages, redirected searches, and pop-up ads, a spyware infection can have more malicious…
Descriptors: Internet, Prevention, Computer Security, Information Technology
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Olagunju, Amos O. – Online Submission, 2008
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…
Descriptors: Safety, Parent Participation, Parent Role, Parent School Relationship
Campus Technology, 2007
This article profiles the winners of this year's competition for outstanding technology innovation on US college and university campuses. The winners are: (1) Rice University, Texas (virtualized networks); (2) Drexel University, Pennsylvania (rich media); (3) Harvard Business School, Massachusetts (network management); (4) Louisiana State…
Descriptors: Educational Innovation, Awards, Emergency Programs, Higher Education
Previous Page | Next Page ยป
Pages: 1 | 2