NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 871 to 885 of 1,585 results Save | Export
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Demski, Jennifer – Campus Technology, 2011
The burgeoning consumer-tech market is creating new challenges for higher education IT departments. As increased expectations of mobility and connectivity have students and faculty looking to consumer technology to meet their academic needs, IT must revamp operations and infrastructure to meet the demand, while keeping security risks and budgets…
Descriptors: Information Services, Educational Technology, Technology Integration, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Chou, Chien; Peng, Hsinyi – Internet and Higher Education, 2011
The Internet has changed many people's lives, in both positive and negative ways. The Taiwan Ministry of Education has recognized the Internet's possible risks and has initiated the island-wide "Teacher Awareness of Internet Safety" (TAIS) project for elementary and middle school teachers since 2000. TAIS project is the first…
Descriptors: Safety, Foreign Countries, Middle School Teachers, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Taylor, Richard G. – ProQuest LLC, 2009
With the increasing amount and severity of information security incidents, organizations are constantly looking for better ways to protect their information. The implementation of physical safeguards such as firewalls and intrusion detection systems is an integral part on an organization's overall information security; however these safeguards…
Descriptors: Employees, Job Satisfaction, Incentives, Motivation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rednic, Emanuil; Toma, Andrei – Journal of Applied Quantitative Methods, 2009
In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the database itself, in the same way, for all classic and multimedia records. So what is the reason for the creation of a security…
Descriptors: Computer Security, Management Systems, Databases, Multimedia Materials
Peer reviewed Peer reviewed
Direct linkDirect link
Shaffer, Steven C. – Online Journal of Distance Learning Administration, 2012
Assessment is an important part of distance education (DE). As class sizes get larger and workloads increase, the IT infrastructure and processes used for DE assessments become more of an issue. Using the BS ISO/IEC 23988:2007 Standard for the use of technology in the delivery of assessments as a guide, this paper describes a rational approach to…
Descriptors: Distance Education, Educational Technology, Disadvantaged, Quality Assurance
Harris, Mark A. – ProQuest LLC, 2010
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
Descriptors: Computer Security, Job Training, Video Technology, Technical Support
Tintamusik, Yanarong – ProQuest LLC, 2010
The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…
Descriptors: Computer Security, Organizational Theories, Information Technology, Banking
Peer reviewed Peer reviewed
Direct linkDirect link
Lorenz, Anja; Borcea-Pfitzmann, Katrin – Interactive Technology and Smart Education, 2010
Purpose: Facing the dilemma between collaboration and privacy is a continual challenge for users. In this setting, the purpose of this paper is to discuss issues of a highly flexible role management integrated in a privacy-enhanced collaborative environment (PECE). Design/methodology/approach: The general framework was provided by former findings…
Descriptors: Cooperation, Interaction, Data, Role
Peer reviewed Peer reviewed
Direct linkDirect link
Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L. – Educational Gerontology, 2010
Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…
Descriptors: Internet, Gender Differences, Older Adults, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan – International Journal of Distance Education Technologies, 2011
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
Descriptors: Electronic Learning, Concept Mapping, Learning Processes, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Pages: 1  |  ...  |  55  |  56  |  57  |  58  |  59  |  60  |  61  |  62  |  63  |  ...  |  106