Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Confidentiality | 3 |
Telecommunications | 3 |
Computer Networks | 2 |
Access to Information | 1 |
Bullying | 1 |
Computer Science | 1 |
Computer System Design | 1 |
Computer Uses in Education | 1 |
Crime | 1 |
Data | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tosun, Nilgün – Journal of Education and Training Studies, 2018
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Social Media
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Littman, Marlyn K. – HyperNexus, 1997
The pervasive use of communication technology in schools and universities requires increased security to safeguard information confidentiality, integrity, availability, utility, and authenticity. This article, the first of two, examines procedures for implementing security policy, techniques for minimizing vulnerability, and techniques for…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design