Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Xie, Jing – ProQuest LLC, 2012
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Descriptors: Computer Software, Computer Security, Programming, Interaction
McNeal, McKenzie, III. – ProQuest LLC, 2012
Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…
Descriptors: Computer Mediated Communication, Information Security, Computer Security, Communications
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Kashiri, Erica; Troyan, Danielle – Industry and Higher Education, 2014
Partnerships between higher education and business have long been an important part of the academic landscape, but often they are based on shorter-term transactional objectives rather than on longer-term strategic goals. BHEF's National Higher Education and Workforce Initiative brings together business and academia at the institutional,…
Descriptors: School Business Relationship, Partnerships in Education, Computer Security, STEM Education
Wespieser, Karen – National Foundation for Educational Research, 2015
This report looks at the online activities of London's young people. The report highlights that children and young people use technology to have fun, study and communicate with others. Most children and young people have positive experiences online. On the whole they are sensible online and do not put themselves "at risk". However, the…
Descriptors: Foreign Countries, Internet, Children, Youth
Miller, Amalia R.; Tucker, Catherine E. – Journal of Policy Analysis and Management, 2011
Fast-paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that…
Descriptors: Computer Security, Patients, Data, Hospitals
Adamo-Villani, Nicoletta; Oania, Marcus; Cooper, Stephen – Journal of Educational Technology Systems, 2013
We report the development and initial evaluation of a serious game that, in conjunction with appropriately designed matching laboratory exercises, can be used to teach secure coding and Information Assurance (IA) concepts across a range of introductory computing courses. The IA Game is a role-playing serious game (RPG) in which the student travels…
Descriptors: Educational Games, Computer Games, Role Playing, Computer Security
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Rivera Vazquez, Juan C. – ProQuest LLC, 2012
Cyber crime is a term used to describe the abuse and misuse of a computer system where it is at a loss for someone across the world. It also refers to crimes committed by, or with computers via the Internet or only accessing a computer, is to steal or manipulate information of a company or a person and to use as a means for traditional such as…
Descriptors: Crime, Computer Security, Attitudes, Questionnaires
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Poremba, Sue Marquette – Campus Technology, 2012
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Descriptors: Higher Education, Access to Computers, Computer Security, Safety
Mantiri, Franky – Universal Journal of Educational Research, 2014
This essay explores the use of computer technology and multimedia in students learning. Undoubtedly, the advent of computer technology has changed the way humans learn and do things. Moreover, "Computer has become standard equipment" (Bitter & Pierson, 2002) in everyday life. The ability to process data in a real time has helped…
Descriptors: Technology Uses in Education, Multimedia Materials, Information Technology, Computers
Paquet, Katherine G. – ProQuest LLC, 2013
Cloud computing may provide cost benefits for organizations by eliminating the overhead costs of software, hardware, and maintenance (e.g., license renewals, upgrading software, servers and their physical storage space, administration along with funding a large IT department). In addition to the promised savings, the organization may require…
Descriptors: Internet, Computer Software, Computers, Information Technology
Adamo, Oluwayomi – ProQuest LLC, 2011
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
Descriptors: Coding, Technology, Error Correction, Computer Software
Dudek, Debra; Johnson, Nicola F. – Children's Literature in Education, 2011
When critics consider young people's practices within cyberspace, the focus is often on negative aspects, namely cyber-bullying, obsessive behaviour, and the lack of a balanced life. Such analyses, however, may miss the agency and empowerment young people experience not only to make decisions but to have some degree of control over their lives…
Descriptors: Novels, Adolescent Literature, Information Technology, Empowerment
Shannon, Li-Jen; Bennett, Judith – Information Systems Education Journal, 2012
A majority of incoming college freshmen and sophomores have not applied their critical thinking skills as part of their learning process. This paper investigates how students acquire their critical thinking skills while facing the copyright, fair use, and internet security challenges in this contemporary digital society. The findings show that 90…
Descriptors: Critical Thinking, Thinking Skills, Case Studies, Computer Science Education

Direct link
Peer reviewed
