Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Author
Agley, Daniel | 1 |
Agley, Jon | 1 |
Brown, David A. | 1 |
Chaplik, Andrew M. | 1 |
Chu, Bei-Tseng | 1 |
Courte, Jill | 1 |
Dickinson, Stephanie L. | 1 |
Eldridge, Lori | 1 |
Gassman, Ruth | 1 |
Hamman, Seth T. | 1 |
Hopkinson, Kenneth M. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Research | 6 |
Guides - Non-Classroom | 2 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 6 |
Elementary Education | 2 |
High Schools | 2 |
Junior High Schools | 2 |
Middle Schools | 2 |
Postsecondary Education | 2 |
Secondary Education | 2 |
Adult Education | 1 |
Grade 10 | 1 |
Grade 4 | 1 |
Grade 7 | 1 |
More ▼ |
Audience
Practitioners | 1 |
Location
Canada | 1 |
Florida | 1 |
North Carolina | 1 |
Taiwan | 1 |
Tennessee | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
General Educational… | 1 |
Test of Adult Basic Education | 1 |
What Works Clearinghouse Rating
Agley, Jon; Tidd, David; Jun, Mikyoung; Eldridge, Lori; Xiao, Yunyu; Sussman, Steve; Jayawardene, Wasantha; Agley, Daniel; Gassman, Ruth; Dickinson, Stephanie L. – Educational and Psychological Measurement, 2021
Prospective longitudinal data collection is an important way for researchers and evaluators to assess change. In school-based settings, for low-risk and/or likely-beneficial interventions or surveys, data quality and ethical standards are both arguably stronger when using a waiver of parental consent--but doing so often requires the use of…
Descriptors: Data Analysis, Longitudinal Studies, Data Collection, Intervention
Perrault, Evan K. – Journal of Educational Computing Research, 2018
Despite improved spam filtering technology, phishing continues to be a prevalent threat for college students. The current study found that approximately 4-in-10 of the students surveyed (N = 462) indicate they do not know what phishing is and the threat it poses. Students also report initially overestimating their confidence to successfully…
Descriptors: Online Courses, Electronic Learning, Student Attitudes, Intention
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Brown, David A. – ProQuest LLC, 2017
Information security is a concern for managers implementing protection measures. Implementing information security measures requires communicating both the reason and remediation for the protection measure. Examining how an anti-spyware security communication affects an individual's intention to implement a protection measure could help improve…
Descriptors: College Students, Fear, Intention, Information Security
Yuan, Xiaohong; Williams, Kenneth; Yu, Huiming; Rorrer, Audrey; Chu, Bei-Tseng; Yang, Li; Winters, Kathy; Kizza, Joseph – Journal of Information Systems Education, 2017
Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop them and integrate them into curricula. Under the support of the National Science Foundation (NSF) Scholarship for Service program, we…
Descriptors: Case Studies, Information Security, Teacher Workshops, Teaching Methods
GED Testing Service, 2018
The manual is presented in the form of a policy grid. The grid includes a consolidated list of General Educational Development (GED) Testing Service policies regarding the GED® test and overall GED® program. The grid combines all of the policies into one unified table and supersedes any prior policy manual.
Descriptors: High School Equivalency Programs, Equivalency Tests, Testing Programs, Educational Policy
Sun, Jerry Chih-Yuan; Lee, Kuan-Hsien – Educational Technology & Society, 2016
The purpose of this study is to evaluate the feasibility of the integration of concept maps and tablet PCs in anti-phishing education for enhancing students' learning motivation and achievement. The subjects were 155 students from grades 8 and 9. They were divided into an experimental group (77 students) and a control group (78 students). To begin…
Descriptors: Learning Motivation, Teaching Methods, Concept Mapping, Handheld Devices
Florida Department of Education, 2017
This technical assistance paper provides guidance to individuals with test administration responsibilities in adult education programs. These policies apply to the approved assessments that programs may use to report educational gains in compliance with the National Reporting System (NRS) requirements. The NRS is the accountability system for the…
Descriptors: Adult Education, Educational Assessment, Testing, Accountability
Werner, Laurie A.; Courte, Jill – Information Systems Education Journal, 2010
Despite advances in spam detection software, anti-spam laws, and increasingly sophisticated users, the number of successful phishing scams continues to grow. In addition to monetary losses attributable to phishing, there is also a loss of confidence that stifles use of online services. Using in-class activities in an introductory computer course…
Descriptors: Information Security, Crime, Prevention, Class Activities