Publication Date
| In 2026 | 0 |
| Since 2025 | 6 |
| Since 2022 (last 5 years) | 25 |
| Since 2017 (last 10 years) | 47 |
| Since 2007 (last 20 years) | 114 |
Descriptor
Source
Author
| DeBlois, Peter B. | 3 |
| Villano, Matt | 3 |
| Buchanan, Rachel | 2 |
| Camp, John S. | 2 |
| Ramaswami, Rama | 2 |
| Smith, Peter, Ed. | 2 |
| Smith, Shamus P. | 2 |
| Southgate, Erica | 2 |
| Akcay, Behiye | 1 |
| Alexander, Charles | 1 |
| Allison, Debra H. | 1 |
| More ▼ | |
Publication Type
Education Level
Location
| Turkey | 5 |
| Spain | 4 |
| India | 3 |
| United Kingdom | 3 |
| United States | 3 |
| Arizona | 2 |
| Australia | 2 |
| Canada | 2 |
| Italy | 2 |
| Maryland | 2 |
| Ohio | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Equal Access | 2 |
| Digital Millennium Copyright… | 1 |
| Family Educational Rights and… | 1 |
Assessments and Surveys
| Trends in International… | 1 |
What Works Clearinghouse Rating
Frank Morley; Emma Walland – Research Matters, 2025
The recent development of Large Language Models (LLMs) such as Claude, Gemini, and GPT has led to widespread attention on potential applications of these models. Marking exams is a domain which requires the ability to interpret and evaluate student responses (often consisting of written text), and the potential for artificial intelligence (AI)…
Descriptors: Ethics, Artificial Intelligence, Automation, Scoring
R. Ravichandran; Sonam Singh; P. Sasikala – Journal of Cybersecurity Education, Research and Practice, 2025
This study investigates the awareness and practices of cyber security among school teachers, exploring their understanding of cyber threats, online behaviours, and response mechanisms to cyber incidents. A structured questionnaire was administered to gather data on demographic information, cyber security training, online practices, and experiences…
Descriptors: Computer Security, Information Security, Teacher Characteristics, Training
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Nicolai Plintz; Dirk Ifenthaler – International Association for Development of the Information Society, 2024
This study aims to develop a preliminary model for the content validation of serious games, specifically to assess two cybersecurity games designed for children aged 8-13 years as part of the Erasmus+ project "SuperCyberKids". Using a scoping review of databases from pedagogy, psychology, and computer science, we identified current…
Descriptors: Computer Security, Educational Games, Computer Uses in Education, Game Based Learning
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Hae Sun Jung; Haein Lee; Keon Chul Park – SAGE Open, 2025
This study investigates user experience (UX) priorities in early childhood education applications by analyzing Korean-language user reviews using Bidirectional Encoder Representations from Transformers topic modeling (BERTopic). Eighteen latent topics were extracted and systematically mapped to the eight software quality characteristics defined by…
Descriptors: Early Childhood Education, Computer Uses in Education, Computer Software, Usability
Howell, Ashley – Advanced Distributed Learning Initiative, 2022
A federated Enterprise Learner Record Repository (ELRR) provides the ability to look across many distributed learner records as if they were from a single source and enables the sharing of local and global learner data across the DoD. This learner data will be pulled from authoritative sources for publishing, customizing, and harmonizing…
Descriptors: Student Records, Training, Computer Uses in Education, Computer Security
Hendrickson, Peggy Bell – College and University, 2021
This article is the second of a two-part series on best practices in receiving digital documents. Part I focused on national databases, third-party digital repositories, institutional websites, and certified documents. Part II looks at a problematic and prevalent of digital records options: email attachments. It discusses the security of email and…
Descriptors: Electronic Mail, Computer Security, Computer Uses in Education, Information Management
Noah Glaser; Zeinab Parishani; Amogh Chetankumar Joshi; Prasad Calyam – Technology, Knowledge and Learning, 2025
As Virtual Reality (VR) gains traction in education, its potential to support neurodivergent learners in cybersecurity training remains underexplored. This emerging technology report examines how VR can bridge the gap between STEM education and cybersecurity training for neurodivergent individuals, highlighting both its promise and the challenges…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Science Education, Computer Security
Topuz, Arif Cem; Saka, Eda; Fatsa, Ömer Faruk; Kursun, Engin – Smart Learning Environments, 2022
The COVID-19 pandemic caused many educational institutions in the world to switch to the distance education process, and this process was called "Emergency Remote Teaching". This urgent transition process has caused many problems in educational environments. One of the problems is the subject of measurement and evaluation. Along with the…
Descriptors: COVID-19, Pandemics, Distance Education, Student Evaluation
Office of Educational Technology, US Department of Education, 2024
Today and in the future, a growing array of Artificial Intelligence (AI) models and capabilities will be incorporated into the products that specifically serve educational settings. The U.S. Department of Education (Department) is committed to encouraging innovative advances in educational technology (edtech) to improve teaching and learning…
Descriptors: Artificial Intelligence, Computer Uses in Education, Educational Technology, Ethics
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
Moorefield-Lang, Heather – Knowledge Quest, 2020
Digital citizenship is defined as the responsible and appropriate behavior in technology and online use. This behavior can also include digital or online etiquette, ethics, and security. With online bullying and cyber safety a continuous concern, teaching students to be responsible and aware digital citizens is imperative (Phillips and Lee 2019).…
Descriptors: Computer Use, Internet, Social Behavior, Death
Esra Merve Çaliskan; I?rem I?tegin – Journal of Cybersecurity Education, Research and Practice, 2024
With the development of technology, security, a core human concern throughout history, has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of…
Descriptors: Gender Differences, Computer Security, Information Security, Sex Role

Peer reviewed
Direct link
