Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Risk Management | 4 |
Telecommunications | 4 |
Educational Technology | 2 |
Foreign Countries | 2 |
Handheld Devices | 2 |
Information Technology | 2 |
Internet | 2 |
Access to Information | 1 |
Accounting | 1 |
Active Learning | 1 |
More ▼ |
Author
Brooks, Tyson T. | 1 |
Cardona-Moltó, María Cristina | 1 |
Chiner, Esther | 1 |
Gómez-Puerta, Marcos | 1 |
Isias, Pedro, Ed. | 1 |
Issa, Theodora, Ed. | 1 |
Issa, Tomayess, Ed. | 1 |
Kommers, Piet, Ed. | 1 |
McKay, Elspeth, Ed. | 1 |
Schaffhauser, Dian | 1 |
Publication Type
Journal Articles | 2 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
India | 1 |
Indiana | 1 |
Montana | 1 |
Poland | 1 |
Russia | 1 |
Saudi Arabia | 1 |
South Africa | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Chiner, Esther; Gómez-Puerta, Marcos; Cardona-Moltó, María Cristina – British Journal of Learning Disabilities, 2017
Background: Internet offers opportunities to people with intellectual disabilities, but it also involves some risks. The aim of this study was to explore these issues considering caregivers and people with intellectual disabilities' perspectives. Materials and Methods: A descriptive, cross-sectional study was conducted. The sample consisted of 77…
Descriptors: Internet, Intellectual Disability, Caregivers, Attitude Measures
Brooks, Tyson T. – ProQuest LLC, 2013
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
Descriptors: Risk Management, Computer Security, Computer Software, Computer Networks
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology