NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Peer reviewed Peer reviewed
Fields, Cheryl – Change: The Magazine of Higher Learning, 2005
Another topic involving privacy has attracted considerable attention in recent months--the "student unit record" issue. The U.S. Department of Education concluded in March that it would be feasible to help address lawmakers' concerns about accountability in higher education by constructing a database capable of tracking students from institution…
Descriptors: Student Records, Information Management, Higher Education, Federal Government
Dempsey, Bert J., Ed.; Jones, Paul, Ed. – 1998
This book gives an overview of the leading-edge Internet application areas (streaming multimedia, collaborative tools, Web databases) and key information policy issues (privacy, censorship, information quality, and more). The text serves as a primer on understanding the forces--economic, legal, social, as well as technological--that are shaping…
Descriptors: Censorship, Computer Security, Databases, Distance Education
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This January 30, 2004 issue of "Chronicle for Higher Education" includes the following articles: (1) "Fighting to Get out of a Rio Slum" (Lloyd, Marion); (2) "Against…
Descriptors: Slums, Adolescents, Foreign Countries, Student Organizations