NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Roberta – Australian Educational Computing, 2016
Young people's online safety continues to be a high priority for educators and parents. Cybersafety policies and educational programs are continually updated and revised to accommodate for the innovative ways they engage with digital culture. However, empirical research has shown that despite these efforts young people, especially teen girls,…
Descriptors: Adolescents, Females, Computer Security, Safety
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Sutton, Susan – Principal Leadership, 2009
This article offers solutions and steps to prevent cyberbullying. Schools can improve their ability to handle cyberbullying by educating staff members, students, and parents and by implementing rules and procedures for how to handle possible incidents. Among the steps is to include a section about cyberbullying and expectations in the student…
Descriptors: Bullying, Internet, Synchronous Communication, Social Networks
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Dowling, Sue Y. – Georgia School Counselors Association Journal, 2006
School counselors should be knowledgeable about the influence of today's technologies on common issues dealt with in counseling. This article describes several of these issues and how they are affected by use of technology. Suggestions are provided to help counselors deal with the current challenges posed by the use of interactive communication…
Descriptors: Counselor Role, School Counselors, Technology Uses in Education, Counseling