Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 4 |
| Since 2007 (last 20 years) | 6 |
Descriptor
| Computer Security | 6 |
| Database Management Systems | 6 |
| Privacy | 6 |
| Information Security | 3 |
| Information Technology | 3 |
| Online Courses | 3 |
| Online Systems | 3 |
| Public Agencies | 3 |
| Risk Management | 3 |
| Teaching Methods | 3 |
| Technology Uses in Education | 3 |
| More ▼ | |
Source
| Journal of Information… | 2 |
| Office of Inspector General,… | 2 |
| International Association for… | 1 |
| Online Journal of Distance… | 1 |
Author
| Brown, Victoria | 1 |
| Mangalaraj, George | 1 |
| Maurer, Chris | 1 |
| Plachkinova, Miloslava | 1 |
| Singh, Anil | 1 |
| Taneja, Aakash | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
| Reports - Descriptive | 2 |
| Collected Works - Proceedings | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 4 |
| Elementary Secondary Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| Greece | 1 |
| Hawaii | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Office of Inspector General, US Department of Education, 2025
The main objective of the Fiscal Year (FY) 2025 Federal Information Security Modernization Act of 2014 (FISMA) audit was to determine whether the United States Department of Education (Department)'s overall information security program and practices are effective as they relate to federal information security requirements. To meet this objective,…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Singh, Anil; Mangalaraj, George; Taneja, Aakash – Journal of Information Systems Education, 2010
This paper offers a compilation of technologies that provides either free or low-cost solutions to the challenges of teaching online courses. It presents various teaching methods the outlined tools and technologies can support, with emphasis on fit between these tools and the tasks they are meant to serve. In addition, it highlights various…
Descriptors: Online Courses, Teaching Methods, Technology Uses in Education, Technology Integration
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
Direct link
