Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Software | 11 |
National Security | 11 |
Information Technology | 5 |
Foreign Countries | 4 |
Computer Security | 3 |
Computer Simulation | 3 |
Ethics | 3 |
Futures (of Society) | 3 |
Higher Education | 3 |
College Faculty | 2 |
Competition | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
Chronicle of Higher Education | 2 |
Association of Small Computer… | 1 |
Comparative Education | 1 |
Journal of Information… | 1 |
Psicologica: International… | 1 |
Author
Donohue, G. L. | 1 |
Edward Vickers | 1 |
Green, Andrew | 1 |
Kim, Richard S. Y. | 1 |
Smith, Peter, Ed. | 1 |
Toure, Ibrahim | 1 |
Weiss, David J. | 1 |
Woszczynski, Amy B. | 1 |
Yoko Mochizuki | 1 |
Zhou, Yicong | 1 |
Publication Type
Journal Articles | 5 |
Dissertations/Theses -… | 3 |
Collected Works - Serial | 2 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Collected Works - Proceedings | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
High Schools | 1 |
Audience
Administrators | 2 |
Teachers | 2 |
Policymakers | 1 |
Researchers | 1 |
Location
Africa | 1 |
Asia | 1 |
China | 1 |
Colorado | 1 |
Japan | 1 |
Mississippi | 1 |
Pennsylvania | 1 |
Russia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yoko Mochizuki; Edward Vickers – Comparative Education, 2024
UNESCO's relatively high prestige across East Asia has spurred intensifying efforts by governments to use its imprimatur to legitimate official narratives of the past and visions of the future. This article focuses on China's use of UNESCO as an arena for competitive national 'branding' in the education field, especially relating to STEM and AI.…
Descriptors: International Education, Artificial Intelligence, Computer Software, Political Influences
Toure, Ibrahim – ProQuest LLC, 2017
Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…
Descriptors: Data Analysis, Prediction, Terrorism, Risk
Woszczynski, Amy B.; Green, Andrew – Journal of Information Systems Education, 2017
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning…
Descriptors: Outcomes of Education, Competition, Information Systems, National Security
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Weiss, David J. – Psicologica: International Journal of Methodology and Experimental Psychology, 2010
Functional measurement studies typically collect numerical data in order to study judgment. The new Nanova (Nominal analysis of "variance") method allows for expansion of the paradigm to include the study of actual or projected behavior. In everyday life, people carry out actions that can be described using verbal labels, which are nominal data.…
Descriptors: Terrorism, Computer Software, Statistical Analysis, Psychometrics
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Smith, Peter, Ed. – Association of Small Computer Users in Education (ASCUE), 2009
The Association of Small Computer Users in Education (ASCUE) is a dynamic organization for people interested in small college technology issues. Its members include information technology professionals, instructional technologists, and faculty members from all over the world who use computers and technology to support teaching and learning. The…
Descriptors: Small Colleges, Information Technology, Educational Technology, Organizations (Groups)
Federal Coordinating Council for Science, Engineering and Technology, Washington, DC. – 1991
This report presents a review of the High Performance Computing and Communications (HPCC) Program, which has as its goal the acceleration of the commercial availability and utilization of the next generation of high performance computers and networks in order to: (1) extend U.S. technological leadership in high performance computing and computer…
Descriptors: Computer Networks, Computer Software, Economic Opportunities, Elementary Secondary Education
Chronicle of Higher Education, 2005
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This March 25, 2005 issue of "Chronicle of Higher Education" includes the following articles: (1) "The Walkable Campus" (Sparling, Phillip B.); (2) "The Sitting Is…
Descriptors: Educational Facilities Planning, Food, Higher Education, Architecture
Donohue, G. L.; And Others – 1987
This report presents examples of Rand's current research in the information sciences and illustrates the application of information science tools to specific policy studies. The projects discussed depict Rand's success with using corporate seed money to bridge the gap between the research and development of new information science tools and…
Descriptors: Communications, Computer Simulation, Computer Software, Database Management Systems
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This March 12, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Fewer Stem Cells Available, NIH Says" (Brainard, Jeffrey); (2)…
Descriptors: Current Events, World Affairs, Higher Education, Scientific Research