Search

Your search keyword '"Information security"' showing total 42,580 results

Search Constraints

Start Over You searched for: Descriptor "Information security" Remove constraint Descriptor: "Information security"
42,580 results on '"Information security"'

Search Results

1. Innovations in Assessing Students' Digital Literacy Skills in Learning Science: Effective Multiple Choice Closed-Ended Tests Using Rasch Model

2. Dangerous Data: What Communities Should Know about Artificial Intelligence, the School-to-Prison Pipeline, and School Surveillance

3. Proceedings of the International Association for Development of the Information Society (IADIS) International Conferences on e-Society (ES 2024, 22nd) and Mobile Learning (ML 2024, 20th) (Porto, Portugal, March 9-11, 2024)

4. The Cost of Doing Homework: Online Homework Systems with Access Codes from a Social Justice Perspective

5. Digital Rights and Responsibility in Education: A Scoping Review

6. Perceptions, Challenges, and Prospects: University Professors' Use of Artificial Intelligence in Education

7. Exploring Student and Family Concerns and Confidence in BigTech Digital Platforms in Public Schools

8. Transforming Education with the Internet of Things: A Journey into Smarter Learning Environments

9. Re-Examining the Future Prospects of Artificial Intelligence in Education in Light of the GDPR and ChatGPT

10. A Pragmatic Approach to Investigating the Digital Existence of Food Bank Users

11. Embracing Artificial Intelligence to Improve Self-Directed Learning: A Cybersecurity Classroom Study

12. Fostering Responsible Behavior Online-Relevance of Cyber Ethics Education

13. An Approach to Improve 'k'-Anonymization Practices in Educational Data Mining

14. Examine the Notion That AI Has Come to Replace Education Jobs in Classroom Teaching and Learning Done by Human Beings

15. Integrating NIST and ISO Cybersecurity Audit and Risk Assessment Frameworks into Cameroonian Law

16. An Interdisciplinary Approach to Experiential Learning in Cyberbiosecurity and Agriculture through Workforce Development

17. What You See Is Not What You Know: Studying Deception in Deepfake Video Manipulation

18. Turkey vs. Italy: Gender and Cyber Security

19. Building a Diverse Cybersecurity Workforce: A Study on Attracting Learners with Varied Educational Backgrounds

20. Development of Cyber Security Platform for Experiential Learning

21. Board of Directors Role in Data Privacy Governance: Making the Transition from Compliance Driven to Good Business Stewardship

22. Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community

23. Infrastructure as Code for Cybersecurity Training

24. Privacy Principles and Harms: Balancing Protection and Innovation

25. The Readiness to Use AI in Teaching Science: Science Teachers' Perspective

26. An Unplugged Didactical Situation on Cryptography between Informatics and Mathematics

27. 2023-2024 Indiana Assessments Policy Manual

28. Ensuring Data Privacy in AI/ML Implementation

29. AI-Related Threats to Information Sovereignty and Challenges for Research Ethics

30. Total Learning Architecture Standards Digital Learning Acquisition Techniques

31. FY 2024 Management Challenges Facing the U.S. Department of Education

32. University Social Responsibility, the Level of Digital Ethics and Knowledge about Data Security: The Case of First-Year and Fifth-Year Students

33. A Study on the Associations among the Factors Influencing Digital Education with Reference to Indian Higher Education

34. West African Online Learning Spaces Security Status and Students' Cybersecurity Awareness Level during COVID-19 Lockdown

35. Building a Culture for Research Data Management in Kenya: A Scoping Review of the Early Indicators

36. Effecting Mobile Security Awareness and Interest in Cybersecurity Using the CovertEyeOp Mobile App Driven User Hack Based Learning Approach

37. Designing a Data Privacy Course

38. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs

39. Social Networking Sites as Affordable Tools for High-Potential Personal Learning Networks: The Case of Teachers as Learners in Vietnam

40. Automated Feedback for Participants of Hands-On Cybersecurity Training

41. K-12 Digital Infrastructure Brief: Defensible & Resilient. Version 1.0

42. Case Study: The Impact of Emerging Technologies on Cybersecurity Education and Workforces

43. Exploring the Strategic Cybersecurity Defense Information Technology Managers Should Implement to Reduce Healthcare Data Breaches

44. Teaching Case: Cybersecurity Assessment for a Manufacturing Company Using Risk Registers -- A Teaching Case

45. Learning Transition Design Principles for Learning and Employment Records: Co-Designing for Equity

46. Sanctity of Digital Privacy and Personal Data during COVID-19: Are Youths Enough Digitally Literate to Deal with It?

47. Predicting Online Learning Success Based on Learners' Perceptions: The Integration of the Information System Success Model and the Security Triangle Framework

48. Measuring Teachers' Knowledge on the Applications of the Nine Pillars of the Fourth Industrial Revolution (4IR) in Education

49. Sustainable and Efficient E-Learning Internet of Things System through Blockchain Technology

50. WebHOLE: Developing a Web-Based Hands-On Learning Environment to Assist Beginners in Learning Web Application Security

Catalog

Books, media, physical & digital resources