Publication Date
In 2025 | 0 |
Since 2024 | 7 |
Since 2021 (last 5 years) | 9 |
Since 2016 (last 10 years) | 13 |
Descriptor
Source
Author
Anderson, Jimmeka | 1 |
Ankur Chattopadhyay | 1 |
Antony, Laljith | 1 |
Brady D. Lund | 1 |
Bui Thanh Hung | 1 |
Gayatri Parasa | 1 |
Gezer, Tuba | 1 |
Hrishikesh Bhide | 1 |
Isias, Pedro, Ed. | 1 |
Issa, Theodora, Ed. | 1 |
Issa, Tomayess, Ed. | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 7 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Collected Works - Serial | 1 |
Education Level
Location
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
Greece | 1 |
India | 1 |
Poland | 1 |
Russia | 1 |
Saudi Arabia | 1 |
South Africa | 1 |
Ukraine | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Hrishikesh Bhide – ProQuest LLC, 2024
The meteoric rise in software and technology has altered the paradigm of information security and privacy. Classified information, stored earlier behind locked doors, is now stored on the internet on servers that can be accessed from anywhere on the globe. As a result of these advancements, we are now vulnerable to cyber-attacks. Cyber-attacks are…
Descriptors: Game Based Learning, Learning Strategies, Computer Security, Computer Science Education
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology
Editorial Projects in Education, 2024
Blended learning combines traditional classroom instruction with online learning, offering personalized and engaging educational experiences. This Spotlight will help you analyze key research on school tech use; review expert tips for staying ahead of tech trends; explore strategies for engaging virtual instruction; examine how to use tech to meet…
Descriptors: Blended Learning, Technology Uses in Education, Student Needs, Educational Technology
Zimmerle, Joanna C.; Wall, Anne S. – Computers in the Schools, 2019
Although the Children's Online Privacy Protection Act (COPPA) was enacted 20 years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children's personal data. Lengthy and oftentimes ambiguous policies…
Descriptors: Privacy, Computer Security, Computer Oriented Programs, Web Sites
Antony, Laljith – ProQuest LLC, 2016
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
Descriptors: Computer Software, Qualitative Research, Case Studies, Information Security
Martin, Florence; Gezer, Tuba; Anderson, Jimmeka; Polly, Drew; Wang, WeiChao – Educational Media International, 2021
Children are exposed to digital devices at an early age. This study examines parents' perception of student digital safety on technology use, time spent, parent concerns and knowledge on various digital safety topics. Through a survey-based study, we analyzed data collected from 113 parents. Parents mentioned that their kids use Internet via…
Descriptors: Parent Attitudes, Child Safety, Internet, Handheld Devices
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology