Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 12 |
Descriptor
Source
Author
Baker, Elizabeth | 1 |
Berutu, Nurmala | 1 |
Cheryl L. Beseler | 1 |
Cradduck, Lucy | 1 |
Delita, Fitra | 1 |
Frank Ciccitto | 1 |
Grant, Robert Luther | 1 |
Gregory, Mark A | 1 |
Jasmin Bhawra | 1 |
Kimberly J. Mitchell | 1 |
Liesen, Joseph J. | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 5 |
Journal Articles | 4 |
Reports - Research | 3 |
Reports - Evaluative | 2 |
Information Analyses | 1 |
Numerical/Quantitative Data | 1 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
M. Claire Buchan; Jasmin Bhawra; Tarun Reddy Katapally – Smart Learning Environments, 2024
The rapid expansion of digital connectivity has provided youth with wide-ranging access to digital platforms for communication, entertainment, and education. In light of this profound shift, there have been growing concerns about online safety, data privacy, and cybersecurity. A critical factor influencing the ability of youth to responsibly…
Descriptors: Digital Literacy, Program Implementation, Measures (Individuals), Foreign Countries
Lisa M. Jones; Kimberly J. Mitchell; Cheryl L. Beseler – Contemporary School Psychology, 2024
School psychologists and other school professionals are increasingly turning to digital citizenship programs to improve children's online safety. However, to date, there has been no rigorous outcome evaluation of these programs. The current study used a cluster randomized control trial methodology (CRCT) to evaluate the impact of the Be Internet…
Descriptors: Elementary School Students, Computer Security, Bullying, Computer Mediated Communication
Sidauruk, Tumiar; Delita, Fitra; Berutu, Nurmala; Yenny, Novida; Suciani, Ayu – International Journal of Technology in Education and Science, 2022
Technology needs to be integrated with every learning process. Moreover, the COVID-19 pandemic situation does not allow face-to-face learning in class. Therefore, online education has become the primary choice. However, online learning itself comes with challenges from the perspective of the teachers and their students. This study aims to analyze…
Descriptors: Program Implementation, Barriers, Electronic Learning, Technology Integration
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Colorado Department of Higher Education, 2022
C.R.S. 24-33.5-1905 (4) directs the Department of Higher Education (DHE, the Department) to prepare a report detailing progress made towards critical state cyber-security goals at institutions of higher education that received an appropriation through SB 18-086. Specifically, the report must include, at a minimum: (1) The number of faculty or…
Descriptors: Program Implementation, Educational Legislation, State Legislation, Computer Security
Liesen, Joseph J. – ProQuest LLC, 2017
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
Descriptors: Qualitative Research, Case Studies, Barriers, Small Colleges
Grant, Robert Luther – ProQuest LLC, 2017
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Descriptors: Information Security, Organizational Culture, Employees, Training
Gregory, Mark A; Cradduck, Lucy – International Association for Development of the Information Society, 2016
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Descriptors: Foreign Countries, Computer Security, Telecommunications, National Security
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Walton, Marquetta – ProQuest LLC, 2016
The effectiveness of U.S. cyber-capabilities can have a serious effect on the cyber-security stance of the US and significantly impact how well U.S. critical infrastructures are protected. The problem is that the state of the U.S. cyber-security could be negatively impacted by the dependency that the US displays in its use of defensive…
Descriptors: Technological Literacy, Computer Security, Information Security, Qualitative Research
US Department of Education, 2018
The Department of Education Strategic Plan for Fiscal Years 2018-2022 describes the policy and operational priorities for the agency. The Plan details the Department's strategic goals and objectives over the next four years. The Plan also provides an overview of our Fiscal Year 2018-2019 Agency Priority Goals.
Descriptors: Strategic Planning, Educational Objectives, Elementary Secondary Education, Educational Improvement