Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 7 |
Integrity | 7 |
Internet | 7 |
Confidentiality | 4 |
Higher Education | 3 |
Information Technology | 3 |
College Students | 2 |
Educational Technology | 2 |
Privacy | 2 |
Questionnaires | 2 |
Safety | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
Internet and Higher Education | 1 |
Journal of Education for… | 1 |
Journal of Information… | 1 |
Journal on Educational… | 1 |
Author
Brustoloni, Jose Carlos | 1 |
Fink, Russell A. | 1 |
Hebah Alquran | 1 |
Henning, Marcus | 1 |
Jokela, Paivi | 1 |
Karlsudd, Peter | 1 |
McLaughlin, Gerald | 1 |
McLaughlin, Josetta | 1 |
Pavelka, Deborah | 1 |
Qleibo, Haider W. | 1 |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Evaluative | 2 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Qleibo, Haider W. – ProQuest LLC, 2009
WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…
Descriptors: Confidentiality, Integrity, Computer Security, Internet
Jokela, Paivi; Karlsudd, Peter – Journal of Information Technology Education, 2007
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Descriptors: Higher Education, Plagiarism, Distance Education, Confidentiality

McLaughlin, Josetta; Pavelka, Deborah; McLaughlin, Gerald – Journal of Education for Business, 2005
A significant trend in higher education evolving from the wide accessibility to the Internet is the availability of an ever-increasing supply of data on Web sites for use by professors, students, and researchers. As this usage by a wider variety of users grows, the ability to judge the integrity of the data, the related findings, and the Web site…
Descriptors: Web Sites, Internet, Evaluation, Data
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Henning, Marcus – Internet and Higher Education, 2004
In the current information age, there is a growing use of and reliance on the Internet. One area of concern for educators is the communication of information using an electronic questionnaire interface. Therefore, it seems pertinent to look at the issue of dissemination of Internet questionnaire information and the integrity of this process.…
Descriptors: Integrity, Questionnaires, Conflict Resolution, Internet