NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
Program for International…1
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zorlu, Eyup – Journal of Learning and Teaching in Digital Age, 2023
The purpose of this study is to examine the relationship between college students' cyberbullying awareness and their ability to ensure their personal cybersecurity. A total of 401 students participated in this study. The Ability to Ensure Personal Cybersecurity Scale, the Cyberbullying Awareness Scale, and a Personal Information Form developed by…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Chaimae Tnibar-Harrus; María José Latorre-Medina – Excellence in Education Journal, 2025
The purpose of this study was to analyze digital competencies of student teachers in Early Childhood Education and Primary Education of the Faculty of Education, Economy and Technology of Ceuta of the University of Granada. Specifically, we investigated the degree of competence in digital ethics that future teachers acquire, develop and/or enhance…
Descriptors: Ethics, Technological Literacy, Early Childhood Teachers, Elementary School Teachers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
David Javier-Aliaga; Oscar Rubén Silva Neyra; Yaquelin E. Calizaya-Milla; Jacksaint Saintila – Contemporary Educational Technology, 2024
The objective of this study is to determine the relationship between academic self-efficacy and digital competence in a sample of undergraduate university students in Peru. The design was nonexperimental, cross-sectional, and correlational. The non-probabilistic sample consisted of 98 students from a private university in Peru. Academic…
Descriptors: Self Efficacy, Competence, Digital Literacy, Undergraduate Students
Sisi Long; Ting Zhu; Xizi Chen – Digital Education Review, 2023
Problematic Internet use (PIU) can lead to dysfunction and undesired consequences, especially in adolescents and youths. Studies have shown that personal emotional characteristics and relationships with others are associated with PIU. We pursue the neglected question of whether there is a correlation between personal ability, such as new media…
Descriptors: Internet, Media Literacy, College Students, Gender Differences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Peter Draus; Sushma Mishra; Kevin Slonka; Natalya Bromall – Information Systems Education Journal, 2024
There is a significant skill gap, with millions of cybersecurity jobs still needing to be fulfilled due to a lack of a trained workforce. Various academic programs are available that teach students in different aspects of cybersecurity. This paper investigates if the title of an IT program has any impact on the desirability of a program and if…
Descriptors: College Students, Information Technology, Information Security, Cybernetics
Emerick, Gerald John – ProQuest LLC, 2020
Despite the strong, global demand for talented workers, higher than average salaries, and relatively low education requirements (bachelor's degree) for computing fields such as cybersecurity, there continues to be a pipeline issue with graduating enough workers educated in cybersecurity to fill the demand in the United States and globally…
Descriptors: Computer Security, Information Security, Career Choice, Influences
Aljuaid, Alanoud – ProQuest LLC, 2022
There is a workforce shortage and a huge gender disparity in the cybersecurity profession globally and Saudi Arabia. Enabling women to access these opportunities involves bolstering training and implementing reforms to give women the go-ahead to access these opportunities. With only a paltry 5% of women being in cybersecurity in the Middle East…
Descriptors: Foreign Countries, Gender Differences, Computer Security, Information Security
Chong, Rylan C. – ProQuest LLC, 2018
The purpose of this study was to investigate the relationships of social cognitive career theory factors of past performance, verbal persuasion, vicarious experience, outcome expectancy, interest, and former students' cybersecurity research self-efficacy; and examine whether the relationships were different among gender, academic classification,…
Descriptors: Social Cognition, Computer Security, Self Efficacy, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tinmaz, Hasan; Lee, Jin Hwa – Participatory Educational Research, 2019
As the communication and information technologies (especially mobile devices) have become a central part of our daily lives, people have started to bring their own devices to schools, universities, companies and other types of organizations. Bearing in mind the difficulty of stopping people from carrying these devices, Bring Your Own Device (BYOD)…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Ownership
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kansu, Ceren Çevik; Öksüz, Yücel – Journal of Education and Training Studies, 2019
This study was aimed to determine of their perceptions and levels of digital citizenship for pre-service classroom teachers. The study was conducted with 76 senior pre-service classroom teachers at Education Faculty of B. U. The study is survey research. In this research, "The Digital Citizenship Scale" developed by Kocadag (2012) was…
Descriptors: Preservice Teachers, Student Attitudes, Technological Literacy, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Jianjun – Grantee Submission, 2014
"Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…
Descriptors: Information Technology, Computer Networks, Curriculum Development, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Norum, Pamela S.; Weagley, Robert O. – Journal of Educational Technology Systems, 2007
The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…
Descriptors: College Students, Risk, Multivariate Analysis, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy
Previous Page | Next Page »
Pages: 1  |  2