Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computers | 4 |
Information Security | 4 |
Information Storage | 4 |
Information Technology | 4 |
Computer Software | 3 |
Delivery Systems | 3 |
Information Management | 3 |
Internet | 3 |
Users (Information) | 3 |
Higher Education | 2 |
Privacy | 2 |
More ▼ |
Publication Type
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Policymakers | 1 |
Location
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Raza, Syed Ali; Khan, Komal Akram – Interactive Technology and Smart Education, 2022
Purpose: Collaboration, communication, critical thinking and creativity are the most essential Cs of education. However, at present, these Cs are interlinked with technology to make it more effective and reliable. Educational technology infuses higher education, many people use it on a daily basis. Students are eager to adopt such technologies…
Descriptors: Academic Achievement, Educational Technology, Higher Education, Internet
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Parakh, Abhishek – ProQuest LLC, 2011
Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…
Descriptors: Computers, Information Storage, Information Dissemination, Mathematics
Buckman, Joel; Gold, Stephanie – College and University, 2012
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Descriptors: Higher Education, Computers, Information Security, Privacy