NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Potnis, Devendra; Allard, Suzie – Journal of Education for Library and Information Science, 2018
Mobile devices are a ubiquitous accessory in daily life for millions of people. These devices can be used to effectively meet a user's information needs. Librarians can assist users with the skills to select, purchase, design, develop, deploy, and maintain mobile applications and related technologies (MAT). Project MISSILE (Mobile Information…
Descriptors: Telecommunications, Handheld Devices, Critical Thinking, Library Science
Ball, Barbara – Mathematics Teaching Incorporating Micromath, 2007
Last year, the author worked with a group of Key Stage 3 (KS3) consultants at a regional roadshow devoted to the topic of information and communications technology (ICT), "Embedding ICT in mathematics teaching." The roadshow was organized by the Association of Teachers of Mathematics (ATM) and the Mathematical Association (MA), and the…
Descriptors: Foreign Countries, Workshops, Consultants, Mathematics Instruction