NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20251
Since 20248
Since 2021 (last 5 years)10
Audience
Location
Arizona1
Greece1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Ishrat Ahmed; Paul Alvarado; Siddharth Jain; Tracy Arner; Elizabeth Reilley; Danielle S. McNamara – Grantee Submission, 2025
The rapid evolution of artificial intelligence (AI) has created an unprecedented opportunity for innovation across industries, but its complexity often presents a steep learning curve for many (Roberts & Candi, 2024; Gunner, 2025). This highlights the need for user-friendly tools that bridge the gap between AI's potential and its practical…
Descriptors: State Universities, Artificial Intelligence, Usability, Innovation
Hrishikesh Bhide – ProQuest LLC, 2024
The meteoric rise in software and technology has altered the paradigm of information security and privacy. Classified information, stored earlier behind locked doors, is now stored on the internet on servers that can be accessed from anywhere on the globe. As a result of these advancements, we are now vulnerable to cyber-attacks. Cyber-attacks are…
Descriptors: Game Based Learning, Learning Strategies, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology
Editorial Projects in Education, 2024
Blended learning combines traditional classroom instruction with online learning, offering personalized and engaging educational experiences. This Spotlight will help you analyze key research on school tech use; review expert tips for staying ahead of tech trends; explore strategies for engaging virtual instruction; examine how to use tech to meet…
Descriptors: Blended Learning, Technology Uses in Education, Student Needs, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Florence; Gezer, Tuba; Anderson, Jimmeka; Polly, Drew; Wang, WeiChao – Educational Media International, 2021
Children are exposed to digital devices at an early age. This study examines parents' perception of student digital safety on technology use, time spent, parent concerns and knowledge on various digital safety topics. Through a survey-based study, we analyzed data collected from 113 parents. Parents mentioned that their kids use Internet via…
Descriptors: Parent Attitudes, Child Safety, Internet, Handheld Devices