Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Networks | 7 |
Information Security | 7 |
Telecommunications | 7 |
Information Technology | 5 |
Information Systems | 3 |
Privacy | 3 |
Administrator Attitudes | 2 |
Computer Software | 2 |
Data Collection | 2 |
Foreign Countries | 2 |
Handheld Devices | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
Australasian Journal of… | 1 |
IEEE Transactions on Education | 1 |
Interdisciplinary Journal of… | 1 |
Journal of Education for… | 1 |
Author
Bell, Kevin R. | 1 |
Cuthrell, Michael Gerard | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Johnson, Kenneth T. | 1 |
Luzeckyj, Ann | 1 |
Searle, Bill | 1 |
Sletten, Michael Alton | 1 |
Tanner, Maureen | 1 |
Thompson, Dale R. | 1 |
Toohey, Danny | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Research | 3 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sletten, Michael Alton – ProQuest LLC, 2020
Mobile devices are rapidly becoming a very popular and convenient means of delivering and consuming learning content worldwide. The rise in popularity is due in part to the technological advancements that mobile devices have made in recent years, along with developments in the online learning platforms and spaces that support mobile learning.…
Descriptors: Educational Technology, Technology Uses in Education, Handheld Devices, Telecommunications
Yang, Samuel C. – Journal of Education for Business, 2018
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in…
Descriptors: Undergraduate Students, Business Schools, Information Technology, Information Systems
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Cuthrell, Michael Gerard – ProQuest LLC, 2011
Optical transmission networks are an integral component of the critical infrastructures for many nations. Many people believe that optical transmission networks are impenetrable. In actuality, these networks possess weaknesses that can be exploited to bring about harm. An emerging Information Assurance (IA) industry has as its goals: to…
Descriptors: Information Technology, Information Systems, Telecommunications, Expertise