NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 691 to 705 of 1,592 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lesnov, Roman Olegovich – International Journal of Computer-Assisted Language Learning and Teaching, 2018
This article compares second language test-takers' performance on an academic listening test in an audio-only mode versus an audio-video mode. A new method of classifying video-based visuals was developed and piloted, which used L2 expert opinions to place the video on a continuum from being content-deficient (not helpful for answering…
Descriptors: Second Language Learning, Second Language Instruction, Video Technology, Classification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawrence, Cameron; Olson, Garrett; Douma, Bambi – Information Systems Education Journal, 2015
The widespread use of digital technologies such as smartphones, tablets, and notebook computers expose firms engaged in international business to risks that far exceed what most corporate technology users understand. This case study examines some of the technology-specific vulnerabilities managers face when engaged in international travel and…
Descriptors: Information Security, Computer Security, Global Approach, Travel
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Cole, Robert – ProQuest LLC, 2013
Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…
Descriptors: Bayesian Statistics, Information Systems, Computer Security, Information Security
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Islam, Muhammad Faysal – ProQuest LLC, 2013
Cloud computing offers the advantage of on-demand, reliable and cost efficient computing solutions without the capital investment and management resources to build and maintain in-house data centers and network infrastructures. Scalability of cloud solutions enable consumers to upgrade or downsize their services as needed. In a cloud environment,…
Descriptors: Risk Assessment, Statistical Analysis, Reliability, Computer Networks
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Shuangbao; Kelly, William – Journal of Learning Analytics, 2017
In this paper, we present a novel system, inVideo, for video data analytics, and its use in transforming linear videos into interactive learning objects. InVideo is able to analyze video content automatically without the need for initial viewing by a human. Using a highly efficient video indexing engine we developed, the system is able to analyze…
Descriptors: Video Technology, Online Courses, Educational Technology, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Moakofhi, Moakofhi; Leteane, Oratile; Phiri, Tawona; Pholele, Thato; Sebalatlheng, Perncy – International Journal of Education and Development using Information and Communication Technology, 2017
The integration of technology in the education process has immensely improved the acquisition and retention of knowledge. Although e-learning initiatives bring many advantages to the education system, these rewards have not been fully realised in developing countries like Botswana. Therefore, in the current study, authors set out to identify…
Descriptors: Foreign Countries, Electronic Learning, Barriers, Agricultural Education
Peer reviewed Peer reviewed
Direct linkDirect link
Woollard, John – Management in Education, 2012
Virtual worlds can offer opportunities to further extend the experience, skills and understanding of professionals, in this case pre-service teachers. Based on the empirical evidence provided by professional, pre-service teachers, this paper describes the social and emotional aspects of being and learning in a virtual world and the implications…
Descriptors: Virtual Classrooms, Preschool Teachers, Internet, Trainees
Kramer, Aleksey – ProQuest LLC, 2013
The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…
Descriptors: Computer Software, Computer Security, Information Technology, Demography
Gurlen, Stephanie – ProQuest LLC, 2013
As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…
Descriptors: Banking, Information Security, Online Systems, Electronic Mail
US Department of Homeland Security, 2013
The "Stop.Think.Connect. Community Outreach Toolkit" was adapted from the Federal Trade Commission's "OnGuardOnline.gov," a project that provides practical tips to help guard against Internet fraud and protect your privacy. The kit will help you offer your community information about protecting kids online. It includes "Stop.Think.Connect.," a…
Descriptors: Internet, Computer Security, Computer Mediated Communication, Guides
Peer reviewed Peer reviewed
Direct linkDirect link
Inan, Fethi A.; Namin, Akbar S.; Pogrund, Rona L.; Jones, Keith S. – Educational Technology & Society, 2016
Twenty individuals with visual impairments were surveyed in order to (a) understand their Internet use and (b) examine relations between metrics related to Internet use and cybersecurity-related knowledge, skills, confidence, and attitudes. Participants used the Internet for various purposes, including information search, communication, chatting,…
Descriptors: Internet, Computer Use, Computer Security, Visual Impairments
Pages: 1  |  ...  |  43  |  44  |  45  |  46  |  47  |  48  |  49  |  50  |  51  |  ...  |  107