Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Campuses | 3 |
Computer Security | 3 |
Technology Uses in Education | 3 |
Information Policy | 2 |
Information Security | 2 |
Performance Technology | 2 |
Barriers | 1 |
College Faculty | 1 |
College Students | 1 |
Computer Networks | 1 |
Curriculum Implementation | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
China | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Shaobin Chen; Qingrong Li; Tao Wang – International Journal of Information and Communication Technology Education, 2024
This study aims to assess the implementation of smart campus and the students' learning engagement at Zhongshan College, China. A well-structured questionnaire was developed, and information was collected from 277 students and 377 teachers. The results indicate that both groups of respondents highly agree on the construction levels of the smart…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Learner Engagement
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to
the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering