NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20256
Since 202410
Publication Type
Journal Articles10
Tests/Questionnaires10
Reports - Research9
Reports - Evaluative1
Audience
Media Staff1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Chrispus Zacharia Oroni; Fu Xianping; Daniela Daniel Ndunguru; Arsenyan Ani – Education and Information Technologies, 2025
In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety…
Descriptors: Educational Technology, Electronic Learning, Information Security, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
Peer reviewed Peer reviewed
Direct linkDirect link
Ece Gumusel – Journal of Education for Library and Information Science, 2025
The rapid advancement of technology has presented marginalized communities in libraries with numerous privacy and security challenges. Many researchers have emphasized the importance of Privacy-Enhancing Technologies (PETs), suggesting that these technical solutions can effectively assist users in safeguarding their personally identifiable…
Descriptors: Privacy, LGBTQ People, College Students, Information Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Hassan Mallam Ibrahim; Kamsuriah Ahmad; Hasimi Sallehudin – Education and Information Technologies, 2025
As the need for digital content increases almost daily, preserving this content for university libraries, especially in the least developed and developing nations, becomes a challenge, resulting in the loss of this data. Even though most of these libraries are automated and adopt one digital preservation strategy or the other, library users need…
Descriptors: Preservation, Technology Uses in Education, Research Libraries, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Van H. Le; Andrew McConney; Dorit Maor – Educational Research for Policy and Practice, 2024
While a great deal has been published about the educational value of social networking sites (SNSs) for teachers, less has focused on teachers who are arguably more dependent on these virtual platforms for informal professional learning due to financial constraints and a lack of regular in-service professional development. Situating this study in…
Descriptors: Social Networks, Social Media, Technology Uses in Education, Teacher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods