Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to
the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Srinivasan, Deepa – ProQuest LLC, 2013
Recent rapid malware growth has exposed the limitations of traditional in-host malware-defense systems and motivated the development of secure virtualization-based solutions. By running vulnerable systems as virtual machines (VMs) and moving security software from inside VMs to the outside, the out-of-VM solutions securely isolate the anti-malware…
Descriptors: Computer Security, Computer Software, Semantics, Computer Simulation
Clark, Christine Y. – ProQuest LLC, 2013
Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…
Descriptors: Computer Security, Employees, Corporations, Training
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Walk This Way: Detailed Steps for Transferring Born-Digital Content from Media You Can Read In-House
Barrera-Gomez, Julianna; Erway, Ricky – OCLC Online Computer Library Center, Inc., 2013
This document is a companion to the report, "You've Got to Walk before You Can Run: First Steps for Managing Born-Digital Content Received on Physical Media." Like the "First Steps" report, the intended audience is those who are just starting to manage born-digital materials, from those wondering where to begin, to those who…
Descriptors: Archives, Electronic Publishing, Documentation, Computer Software
Smiley, Garrett – ProQuest LLC, 2013
E-learning has grown to such an extent that paper-based testing is being replaced by computer-based testing otherwise known as e-exams. Because these e-exams can be delivered outside of the traditional proctored environment, additional authentication measures must be employed in order to offer similar authentication assurance as found in…
Descriptors: Computer Assisted Testing, Licensing Examinations (Professions), Computer Security, Pretests Posttests
Tekerek, Mehmet; Tekerek, Adem – Online Submission, 2013
In this study, elementary and high school students' information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaras City, towns, small towns and villages of Kahramanmaras province.…
Descriptors: Foreign Countries, Elementary School Students, High School Students, Knowledge Level
Pittman, Jason – Journal of Information Technology Education: Research, 2013
The use of laboratories as part of cybersecurity education is well evidenced in the existing literature. We are informed about the benefits, different types of laboratories and, in addition, underlying learning theories therein. Existing research also demonstrates that the success of employing cybersecurity laboratory exercises relies upon…
Descriptors: Computer Security, Laboratories, Technology Uses in Education, Delivery Systems
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Perkey, Dennis – Athletic Training Education Journal, 2012
As technology advances and becomes more portable, athletic training educators (ATEs) have many options available to them. Whether attempting to streamline efforts in courses, or operate a more efficient athletic training education program, portable technology is becoming an important tool that will assist the ATE. One tool that allows more…
Descriptors: Allied Health Occupations Education, Athletics, Computer Uses in Education, Internet
Commitment to Cybersecurity and Information Technology Governance: A Case Study and Leadership Model
Curtis, Scipiaruth Kendall – ProQuest LLC, 2012
The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…
Descriptors: Computer Security, Information Technology, Governance, Case Studies
Torres Peralta, Raquel – ProQuest LLC, 2012
Multi-touch tablets allow users to interact with computers through intuitive, natural gestures and direct manipulation of digital objects. One advantage of these devices is that they can offer a large, collaborative space where several users can work on a task at the same time. However the lack of privacy in these situations makes standard…
Descriptors: Handheld Devices, Manipulative Materials, Computer Security, Privacy
Skurnac, Steve – American School & University, 2012
Data security breaches in the educational sector can be devastating to institutions and the students and employees they serve. They carry the potential for identity theft, violations of federal and state laws, and loss of trust of students, alumni and employees. The Identity Theft Resource Center says that as of October 2011, education…
Descriptors: Video Technology, Employees, School Security, Electronics
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks