Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 10 |
Descriptor
Computer Security | 10 |
Data Collection | 10 |
Information Security | 7 |
Data Analysis | 4 |
Foreign Countries | 3 |
Barriers | 2 |
COVID-19 | 2 |
Educational Technology | 2 |
Ethics | 2 |
High School Students | 2 |
Identification | 2 |
More ▼ |
Source
Author
Casagrande, Marco | 1 |
Celeda, Pavel | 1 |
Christine Wildman | 1 |
Conti, Mauro | 1 |
Di Gangi, Paul M. | 1 |
Edwards, John | 1 |
Fedeli, Monica | 1 |
Goh, Samuel H. | 1 |
Hamrick, Jennifer D. | 1 |
Harry May | 1 |
Hart, Kaden | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 7 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Reports - Descriptive | 1 |
Education Level
High Schools | 2 |
Higher Education | 2 |
Postsecondary Education | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Audience
Administrators | 1 |
Location
Australia | 1 |
Canada | 1 |
Indiana | 1 |
Italy | 1 |
Maine | 1 |
Maryland | 1 |
Massachusetts (Cambridge) | 1 |
New Jersey | 1 |
Utah | 1 |
Virginia | 1 |
Washington | 1 |
More ▼ |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Every Student Succeeds Act… | 1 |
Individuals with Disabilities… | 1 |
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Pangrazio, Luci; Selwyn, Neil – Pedagogy, Culture and Society, 2021
The ongoing 'datafication' of contemporary society has a number of implications for schools and schooling. One is the increasing calls for schools to help develop young people's understandings about the role that digital data now plays in their everyday lives -- especially in terms of the 'data economy' and 'surveillance capitalism'. Reporting on…
Descriptors: Data Collection, Data Analysis, Technology Uses in Education, Data Processing
National Forum on Education Statistics, 2022
Digital inequity has been a long-standing issue in the education community. A lack of home internet and technology devices can not only hinder students' ability to access educational resources at home, but can also have a detrimental effect on student achievement. Education agencies have taken steps over the past decades to address digital…
Descriptors: Access to Computers, Technology Uses in Education, Educational Technology, Internet
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology