Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 5 |
Decision Making | 5 |
Telecommunications | 5 |
Educational Technology | 3 |
Information Technology | 3 |
Access to Information | 2 |
Acoustics | 2 |
Case Studies | 2 |
Computer Science | 2 |
Educational Planning | 2 |
Feedback (Response) | 2 |
More ▼ |
Source
EDUTECH Report | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
ProQuest LLC | 1 |
Publication Type
Journal Articles | 2 |
Collected Works - Proceedings | 1 |
Collected Works - Serials | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Hawaii | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
District of Columbia | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Pollock, Tommy; Levy, Yair; Li, Wei; Kumar, Ajoy – Journal of Cybersecurity Education, Research and Practice, 2022
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research…
Descriptors: Decision Making, Information Security, Specialists, Users (Information)
Caudle, Daryl L. – ProQuest LLC, 2010
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Descriptors: Information Systems, Organizational Change, Telecommunications, Information Technology

McKimmy, Paul B. – International Journal of Instructional Media, 2005
In April 2002, the Technology Advisory Committee of the University of Hawaii-Manoa College of Education (COE) prioritized the upgrade of existing instructional computer labs. Following several weeks of research and discussion, a decision was made to support wireless and mobile technologies during the upgrade. In June 2002, the first of three…
Descriptors: Resource Allocation, Costs, Educational Technology, Telecommunications
EDUTECH Report, 1993
This newsletter examines education technology issues of concern to school faculty and administrators. Regular features in each issue include educational technology news, a book review, and a question and answer column. The cover articles during this volume year are: "Data Access Issues: Security Vs. Openness"; "Creation of an…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Decision Making
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers