Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Privacy | 3 |
| Synchronous Communication | 3 |
| Computer Software | 2 |
| Handheld Devices | 2 |
| Internet | 2 |
| Telecommunications | 2 |
| Administrators | 1 |
| Artificial Intelligence | 1 |
| Bias | 1 |
| Cheating | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
Audience
Location
| Cambodia | 1 |
| Indiana | 1 |
| Massachusetts | 1 |
| Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mengkorn Pum; Sarin Sok – Asian Journal of Distance Education, 2024
With current state-of-the-art advances in artificial intelligence (AI), especially large language models, such as Google's Gemini, Microsoft's Copilot, and ChatGPT, among others, a plethora of research on this phenomenon has been conducted worldwide aiming to examine its limitations, benefits and ethical implications. Nonetheless, such a…
Descriptors: Foreign Countries, Artificial Intelligence, Technology Uses in Education, Computer Software
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security

Peer reviewed
Direct link
