NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 916 to 930 of 1,624 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Shaffer, Steven C. – Online Journal of Distance Learning Administration, 2012
Assessment is an important part of distance education (DE). As class sizes get larger and workloads increase, the IT infrastructure and processes used for DE assessments become more of an issue. Using the BS ISO/IEC 23988:2007 Standard for the use of technology in the delivery of assessments as a guide, this paper describes a rational approach to…
Descriptors: Distance Education, Educational Technology, Disadvantaged, Quality Assurance
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Taylor, Richard G. – ProQuest LLC, 2009
With the increasing amount and severity of information security incidents, organizations are constantly looking for better ways to protect their information. The implementation of physical safeguards such as firewalls and intrusion detection systems is an integral part on an organization's overall information security; however these safeguards…
Descriptors: Employees, Job Satisfaction, Incentives, Motivation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rednic, Emanuil; Toma, Andrei – Journal of Applied Quantitative Methods, 2009
In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the database itself, in the same way, for all classic and multimedia records. So what is the reason for the creation of a security…
Descriptors: Computer Security, Management Systems, Databases, Multimedia Materials
Peer reviewed Peer reviewed
Direct linkDirect link
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan – International Journal of Distance Education Technologies, 2011
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
Descriptors: Electronic Learning, Concept Mapping, Learning Processes, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Harris, Mark A. – ProQuest LLC, 2010
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
Descriptors: Computer Security, Job Training, Video Technology, Technical Support
Tintamusik, Yanarong – ProQuest LLC, 2010
The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…
Descriptors: Computer Security, Organizational Theories, Information Technology, Banking
Peer reviewed Peer reviewed
Direct linkDirect link
Lorenz, Anja; Borcea-Pfitzmann, Katrin – Interactive Technology and Smart Education, 2010
Purpose: Facing the dilemma between collaboration and privacy is a continual challenge for users. In this setting, the purpose of this paper is to discuss issues of a highly flexible role management integrated in a privacy-enhanced collaborative environment (PECE). Design/methodology/approach: The general framework was provided by former findings…
Descriptors: Cooperation, Interaction, Data, Role
Peer reviewed Peer reviewed
Direct linkDirect link
Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L. – Educational Gerontology, 2010
Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…
Descriptors: Internet, Gender Differences, Older Adults, Knowledge Level
DeSantis, Nick – Chronicle of Higher Education, 2012
College campuses are hothouses of data, including course schedules, degree requirements, and grades. But much of the information remains spread out across software systems or locked on university servers. Start-up companies want to pry the information loose from campus servers in order to offer personalized services that could transform the…
Descriptors: Higher Education, Campuses, Grades (Scholastic), Scores
Peer reviewed Peer reviewed
Direct linkDirect link
Pereira, Roberto; Baranauskas, M. Cecilia C.; da Silva, Sergio Roberto P. – Educational Technology & Society, 2013
Social software is a growing reality worldwide and several authors are discussing its use to promote social interaction in learning contexts. Although problems regarding privacy, reputation, and identity are commonly reported in social software, an explicit concern regarding peoples' values is not a common practice in its design and adoption,…
Descriptors: Social Networks, Computer Software, Semiotics, Values
Clarke, Marlon – ProQuest LLC, 2011
As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors…
Descriptors: Technical Support, Individual Characteristics, Self Efficacy, Focus Groups
Sutton, Susan – Principal Leadership, 2009
This article offers solutions and steps to prevent cyberbullying. Schools can improve their ability to handle cyberbullying by educating staff members, students, and parents and by implementing rules and procedures for how to handle possible incidents. Among the steps is to include a section about cyberbullying and expectations in the student…
Descriptors: Bullying, Internet, Synchronous Communication, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2009
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Descriptors: Internet, School Districts, Computer Software, Web Sites
Pages: 1  |  ...  |  58  |  59  |  60  |  61  |  62  |  63  |  64  |  65  |  66  |  ...  |  109