NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 18 results Save | Export
Michael Dean Barker – ProQuest LLC, 2023
The emergence of new credentials is changing the landscape of traditional post-secondary education. The tight labor market's rising demand to fill vacancies in high-demand career fields such as cybersecurity has led to so-called "alternative credentials" to rapidly upskill and reskill existing professionals to move into the industry.…
Descriptors: Postsecondary Education, Credentials, Employment Qualifications, Labor Needs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Peer reviewed Peer reviewed
Direct linkDirect link
Florence Martin; Doreen Mushi; Siyu Long; Julie Bacak; Drew Polly; Weichao Wang; Lynn Ahlgrim-Delzell – Journal of Technology and Teacher Education, 2024
Digital safety involves protecting oneself, and one's personal information to mitigate the risks that are inherently associated with using digital technologies. This study employed a multi-method design to explore 26 inservice and preservice elementary teacher experiences from attending a professional development on digital safety and facilitating…
Descriptors: Safety, Preservice Teachers, Elementary School Teachers, Summer Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Florence; Gezer, Tuba; Wang, Wei Chao; Petty, Teresa; Wang, Chuang – Journal of Research on Technology in Education, 2022
Digital citizenship refers to exhibiting responsible digital habits to function in a digital world. The purpose of this mixed methods study is to examine K-12 educators' experiences based on a digital citizenship graduate-level course that they participated in for professional development. Forty-five educators participated in this course. In…
Descriptors: Elementary Secondary Education, Teaching Experience, Graduate Study, Faculty Development
Peer reviewed Peer reviewed
Direct linkDirect link
Joshi, Omkar; Chapagain, Binod; Kharel, Gehendra; Poudyal, Neelam C.; Murray, Bryan D.; Mehmood, Sayeed R. – Interactive Learning Environments, 2022
Many land-grant institutions with agriculture and natural resource programs in the United States offer online courses to meet student demand. The goal of this study was to understand how major educational stakeholders, including instructors and students, perceive the benefits and limitations of online teaching and learning in agriculture and…
Descriptors: Online Courses, Distance Education, Electronic Learning, Web Based Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mary Beth Klinger – Journal of Cybersecurity Education, Research and Practice, 2024
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students' sense of belonging and connectedness in the…
Descriptors: Computer Security, Sense of Community, Associate Degrees, Community College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Scarabottolo, Nello – International Association for Development of the Information Society, 2018
This paper compares the students enrolled to a three-year undergraduate, bachelor degree on Security of Computer Systems and Networks -- offered in traditional, classroom fashion as well as online at the University of Milan (Italy) -- in terms of results in exams of the various courses as well as in the final dissertation for obtaining the degree.…
Descriptors: Online Courses, Educational Technology, Technology Uses in Education, Undergraduate Students
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development
Peer reviewed Peer reviewed
Direct linkDirect link
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Essig, Rebecca R.; Elahi, Behim; Hunter, Jennifer L.; Mohammadpour, Atefeh; O'Connor, Kimberly W. – Journal of STEM Outreach, 2020
"Future Girls of STEM" is a university-sponsored, summer camp outreach program that was designed and implemented by an all-female faculty group to increase young girls' interest in pursuing future careers in science, technology, engineering, and mathematics (STEM). This paper discusses the logistics and results of the pilot Future Girls…
Descriptors: Females, Camps, STEM Education, Engineering
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses
Previous Page | Next Page ยป
Pages: 1  |  2