Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 7 |
Descriptor
| Computer Security | 7 |
| Knowledge Management | 7 |
| Information Technology | 5 |
| Computer Science Education | 3 |
| Computer Software | 3 |
| Computers | 3 |
| Information Security | 3 |
| Internet | 3 |
| Models | 3 |
| Risk | 3 |
| Access to Information | 2 |
| More ▼ | |
Source
| Online Submission | 2 |
| ProQuest LLC | 2 |
| Association Supporting… | 1 |
| International Association for… | 1 |
| International Journal of… | 1 |
Author
| Anna Drobná | 1 |
| Conley-Ware, Lakita D. | 1 |
| Cyril Brom | 1 |
| Dixit, R. K. | 1 |
| Filip Dechterenko | 1 |
| Isias, Pedro, Ed. | 1 |
| Issa, Theodora, Ed. | 1 |
| Issa, Tomayess, Ed. | 1 |
| Katerina Kacerovská | 1 |
| Kommers, Piet, Ed. | 1 |
| Kristina Volná | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 3 |
| Collected Works - Proceedings | 2 |
| Reports - Research | 2 |
| Collected Works - Serial | 1 |
| Journal Articles | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Adult Education | 2 |
| Higher Education | 2 |
| Postsecondary Education | 2 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Grade 2 | 1 |
| Primary Education | 1 |
Audience
Location
| Australia | 1 |
| China | 1 |
| Costa Rica | 1 |
| Croatia | 1 |
| Illinois (Chicago) | 1 |
| India | 1 |
| Poland | 1 |
| Russia | 1 |
| Saudi Arabia | 1 |
| South Africa | 1 |
| Ukraine | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Lamb, Christopher J. – ProQuest LLC, 2013
The Advanced Persistent Threat (APT) presents an ever present and more growing threat to organizations across the globe. Traditional Information Technology (IT) incident response falls short in effectively addressing this threat. This researcher investigated the use of single-loop and double-loop learning in two organizations with internal…
Descriptors: Learning, Case Studies, Information Technology, Computer Security
Shirley J. Caruso – Online Submission, 2016
This single instrumental qualitative case study explores and thickly describes job performance outcomes based upon the manner in which self-directed learning activities of a purposefully selected sample of 3 construction managers are conducted, mediated by the use of Web 2.0 technology. The data collected revealed that construction managers are…
Descriptors: Web 2.0 Technologies, Technology Uses in Education, Independent Study, Job Performance
Conley-Ware, Lakita D. – ProQuest LLC, 2010
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Descriptors: Crime, Terrorism, Identification, Computer Security
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology

Peer reviewed
Direct link
