NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20250
Since 2022 (last 5 years)3
Since 2017 (last 10 years)5
Since 2007 (last 20 years)12
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 12 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mengkorn Pum; Sarin Sok – Asian Journal of Distance Education, 2024
With current state-of-the-art advances in artificial intelligence (AI), especially large language models, such as Google's Gemini, Microsoft's Copilot, and ChatGPT, among others, a plethora of research on this phenomenon has been conducted worldwide aiming to examine its limitations, benefits and ethical implications. Nonetheless, such a…
Descriptors: Foreign Countries, Artificial Intelligence, Technology Uses in Education, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
James T. McCafferty – Journal of Cybersecurity Education, Research and Practice, 2024
Engagement is a critical part of student learning and student success. This is especially true in online classes where students have less interaction with their classmates and instructors when compared to traditional face-to-face courses. Research on engagement has shown that when students are meaningfully engaged it can increase student…
Descriptors: Online Courses, Graduate Study, Computer Security, Learner Engagement
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Roberta – Australian Educational Computing, 2016
Young people's online safety continues to be a high priority for educators and parents. Cybersafety policies and educational programs are continually updated and revised to accommodate for the innovative ways they engage with digital culture. However, empirical research has shown that despite these efforts young people, especially teen girls,…
Descriptors: Adolescents, Females, Computer Security, Safety
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Sutton, Susan – Principal Leadership, 2009
This article offers solutions and steps to prevent cyberbullying. Schools can improve their ability to handle cyberbullying by educating staff members, students, and parents and by implementing rules and procedures for how to handle possible incidents. Among the steps is to include a section about cyberbullying and expectations in the student…
Descriptors: Bullying, Internet, Synchronous Communication, Social Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security