Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 11 |
Descriptor
College Students | 13 |
Computer Security | 13 |
Telecommunications | 13 |
Computers | 6 |
Handheld Devices | 6 |
Computer Networks | 5 |
Foreign Countries | 5 |
Internet | 5 |
Distance Education | 4 |
Information Security | 4 |
Information Technology | 4 |
More ▼ |
Source
Author
Annessi, Robert | 1 |
Bernhardt, Valentin | 1 |
Brooks, Rochelle | 1 |
Chin, Amita | 1 |
Conley, Stephanie Scheer | 1 |
Cossey, David | 1 |
Frkat, Davor | 1 |
Isaias, Pedro, Ed. | 1 |
Jamal, Bakht | 1 |
Jones, Beth | 1 |
Kaikho Ashuni | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 4 |
Reports - Research | 4 |
Collected Works - Proceedings | 3 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 13 |
Postsecondary Education | 7 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Germany | 2 |
India | 2 |
Italy | 2 |
Ohio | 2 |
Pakistan | 2 |
Asia | 1 |
Australia | 1 |
Austria (Vienna) | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jamal, Bakht; Rizvi, Syed Asad Abbas – Pakistan Journal of Distance and Online Learning, 2023
This paper intended to analyze the practices of digital citizenship among university student in Pakistan. The quantitative descriptive survey research design was adopted for this study. The population of the study was 800 students of BS (Education) program in ten public sector universities in Punjab, Pakistan. Simple random sampling technique was…
Descriptors: Foreign Countries, Technological Literacy, College Students, Computer Use
Chin, Amita; Jones, Beth; Little, Philip – International Journal of Education and Development using Information and Communication Technology, 2021
This study on smartphone security behaviors and practices is a continuation of the work in Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive university were compared to results from a 2014 survey at the same institution. That study found that students continued to be lax in their mobile security practices.…
Descriptors: Telecommunications, Handheld Devices, Computer Security, Student Attitudes
Kaikho Ashuni – Asian Journal of Distance Education, 2024
The digital age has opened up new and exciting opportunities for Open and Distance Learning (ODL) in universities. But, is going digital reinforcing the existing social inequalities? This qualitative research examines the three levels of digital divide and digital inequality among learners at India's National Open University, IGNOU. The findings…
Descriptors: Distance Education, Open Education, Open Universities, Social Justice
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Young, Jeffrey R. – Education Digest: Essential Readings Condensed for Quick Review, 2009
In this article, the author presents the top-10 list of campus computer-security risks he compiled based on several recent computing surveys and interviews with more than a dozen college-technology leaders. The list, ordered from least to most serious, is by no means scientific, but it gives a sense of where today's battle lines are--and why…
Descriptors: Computer Security, Computers, Social Networks, Evaluation Methods
McSwain-Starrett, Lauren T.; Conley, Stephanie Scheer – EDUCAUSE Quarterly, 2011
Student computing is now mobile. For college students across the nation, convenient access to information--anytime, anywhere, on demand--has become not only a priority, but a necessity. To successfully serve the needs of this current generation of students, colleges and universities must recognize the trend and align services accordingly.…
Descriptors: College Students, Access to Information, Handheld Devices, Computer Software
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Cossey, David – Association of Small Computer Users in Education (ASCUE), 2005
Small colleges have unique challenges with respect to their information technology environments. It is easy to forget sometimes that small colleges are not simply small big colleges, and that IT needs to be considered in a particular way, especially because of its associated costs. For one thing, the senior administration at a small college may be…
Descriptors: Information Technology, Small Colleges, Telecommunications, Computers
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2005
This 2005 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Campus Technology: Anticipating the Future." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document include: (1) Developing…
Descriptors: Virtual Classrooms, Programming (Broadcast), Computers, Tests
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers