Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Information Technology | 4 |
Models | 4 |
Prevention | 4 |
Computer Security | 3 |
Risk | 3 |
Internet | 2 |
Legislation | 2 |
Natural Disasters | 2 |
Prediction | 2 |
Use Studies | 2 |
Academic Achievement | 1 |
More ▼ |
Author
Gresham, Frank M., Ed. | 1 |
Isias, Pedro, Ed. | 1 |
Issa, Theodora, Ed. | 1 |
Issa, Tomayess, Ed. | 1 |
Kommers, Piet, Ed. | 1 |
McKay, Elspeth, Ed. | 1 |
Park, Insu | 1 |
Roumani, Yaman | 1 |
Walker, Hill M., Ed. | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Books | 1 |
Collected Works - General | 1 |
Collected Works - Proceedings | 1 |
Guides - Classroom - Teacher | 1 |
Education Level
High Schools | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Counselors | 1 |
Researchers | 1 |
Teachers | 1 |
Location
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
India | 1 |
New York | 1 |
Poland | 1 |
Russia | 1 |
Saudi Arabia | 1 |
South Africa | 1 |
Ukraine | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Roumani, Yaman – ProQuest LLC, 2012
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Descriptors: Computer Software, Risk, Computer Security, Information Technology
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Handbook of Evidence-Based Practices for Emotional and Behavioral Disorders: Applications in Schools
Walker, Hill M., Ed.; Gresham, Frank M., Ed. – Guilford Press, 2013
This authoritative volume provides state-of-the-art practices for supporting the approximately 20% of today's K-12 students who have emotional and behavioral disorders (EBD) that hinder school success. Leading experts present evidence-based approaches to screening, progress monitoring, intervention, and instruction within a multi-tiered framework.…
Descriptors: Evidence Based Practice, Intervention, Emotional Disturbances, Behavior Disorders
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology