Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Access to Information | 3 |
Computer Security | 3 |
Barriers | 2 |
Information Security | 2 |
Administrator Attitudes | 1 |
Administrator Education | 1 |
Adult Education | 1 |
Adults | 1 |
Andragogy | 1 |
Case Studies | 1 |
Children | 1 |
More ▼ |
Author
Acquisti, Alessandro | 1 |
Anderson, Jimmeka | 1 |
Fisk, Nathan | 1 |
Guernsey, Lisa | 1 |
Romanosky, Sasha | 1 |
Shirley J. Caruso | 1 |
Singer, Peter Warren | 1 |
Telang, Rahul | 1 |
Publication Type
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Adult Education | 3 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
United States | 2 |
Florida | 1 |
Illinois (Chicago) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro – Journal of Policy Analysis and Management, 2011
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
Descriptors: Identification (Psychology), Access to Information, Deception, Computer Security
Shirley J. Caruso – Online Submission, 2016
This single instrumental qualitative case study explores and thickly describes job performance outcomes based upon the manner in which self-directed learning activities of a purposefully selected sample of 3 construction managers are conducted, mediated by the use of Web 2.0 technology. The data collected revealed that construction managers are…
Descriptors: Web 2.0 Technologies, Technology Uses in Education, Independent Study, Job Performance