Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 11 |
Since 2016 (last 10 years) | 16 |
Since 2006 (last 20 years) | 21 |
Descriptor
Information Security | 21 |
Program Effectiveness | 21 |
Computer Security | 8 |
College Students | 6 |
Barriers | 5 |
Privacy | 5 |
Higher Education | 4 |
Knowledge Level | 4 |
Models | 4 |
Postsecondary Education | 4 |
Student Attitudes | 4 |
More ▼ |
Source
Author
Wang, Jianjun | 2 |
Alexandra Rysul'ova | 1 |
Alison E. Kelly | 1 |
Anwar, M. | 1 |
Arreerard, Woraphapa | 1 |
Biros, David | 1 |
Bussey, Karen | 1 |
Christopher D. Adams | 1 |
Cummings, Jeffrey | 1 |
Dancy, Kim | 1 |
Dickson K.W. Chiu | 1 |
More ▼ |
Publication Type
Reports - Research | 15 |
Journal Articles | 12 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 2 |
Tests/Questionnaires | 2 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Postsecondary Education | 21 |
Higher Education | 19 |
Elementary Education | 3 |
Elementary Secondary Education | 2 |
High Schools | 2 |
Secondary Education | 2 |
Early Childhood Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Every Student Succeeds Act… | 1 |
Higher Education Act 1980 | 1 |
Stewart B McKinney Homeless… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Michael Dean Barker – ProQuest LLC, 2023
The emergence of new credentials is changing the landscape of traditional post-secondary education. The tight labor market's rising demand to fill vacancies in high-demand career fields such as cybersecurity has led to so-called "alternative credentials" to rapidly upskill and reskill existing professionals to move into the industry.…
Descriptors: Postsecondary Education, Credentials, Employment Qualifications, Labor Needs
Kwun Hung Li; Dickson K.W. Chiu; Elaine W.S. Kong; Kevin K.W. Ho – Education & Training, 2025
Purpose: This research investigates mobile security awareness among university students in Hong Kong, who increasingly rely on mobile devices for their daily activities and academic needs. This research seeks to inform targeted educational strategies and policies to enhance mobile security practices among young adults, particularly in regions…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, College Students
Maya Usher; Miri Barak – International Journal of STEM Education, 2024
As artificial intelligence (AI) technology rapidly advances, it becomes imperative to equip students with tools to navigate through the many intricate ethical considerations surrounding its development and use. Despite growing recognition of this necessity, the integration of AI ethics into higher education curricula remains limited. This paucity…
Descriptors: Artificial Intelligence, Ethics, Ethical Instruction, Online Courses
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Florence Martin; Doreen Mushi; Siyu Long; Julie Bacak; Drew Polly; Weichao Wang; Lynn Ahlgrim-Delzell – Journal of Technology and Teacher Education, 2024
Digital safety involves protecting oneself, and one's personal information to mitigate the risks that are inherently associated with using digital technologies. This study employed a multi-method design to explore 26 inservice and preservice elementary teacher experiences from attending a professional development on digital safety and facilitating…
Descriptors: Safety, Preservice Teachers, Elementary School Teachers, Summer Programs
Virginia Clinton-Lisell; Alison E. Kelly – International Journal of Technology in Education and Science, 2024
The use of online homework systems that require the purchase of an access code has become widespread. The purpose of this study is to examine student experiences with and perceptions of online homework systems with access codes. Postsecondary students (N = 966) completed a survey about the financial costs, perceptions of quality, engagement with,…
Descriptors: Homework, Educational Technology, Technology Uses in Education, Student Experience
Wilkerson, David A.; Wolfe-Taylor, Samantha N.; Kinney, M. Killian – Journal of Social Work Education, 2021
Student technology uncertainty was investigated in an introductory e-Social Work (e-SW) practice course. e-SW practice includes technology-mediated advocacy, research, and services delivery. A convergent parallel mixed methods design included pre- and post-test e-SW self-efficacy surveys and student reflections. There were significant measurable…
Descriptors: Introductory Courses, Online Courses, Social Work, Graduate Students
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development
Janicki, Thomas; Cummings, Jeffrey – Information Systems Education Journal, 2022
As the skills and competencies needed by Information Systems (IS) undergraduates continues to grow, various IS professional societies have developed recommendations which are updated on a periodic basis. These recommendations known as 'model curricula' are a guide for faculty and institutions to consider when developing or evaluating the…
Descriptors: Information Science Education, Information Systems, Computer Software, Undergraduate Students
Bussey, Karen; Dancy, Kim; Voight, Mamie – Institute for Higher Education Policy, 2019
Accurately evaluating what works -- and what doesn't -- to improve student progression through higher education requires the robust use of reliable data. States play a pivotal role in compiling and using data to empower student choice, spur continuous institutional and system improvement, and develop evidence-based solutions that promote college…
Descriptors: Postsecondary Education, Evidence Based Practice, Data Collection, Data Use
Federal Student Aid, US Department of Education, 2020
The Federal Student Aid's (FSA's) Five-Year Strategic Plan for Fiscal Years 2020-24 (Five-Year Plan) establishes ambitious goals and objectives to ensure that FSA continues to provide access to higher education regardless of one's past educational experiences or socioeconomic status. This Five-Year Plan was informed by public comments; focus…
Descriptors: Strategic Planning, Student Financial Aid, Student Loan Programs, Loan Repayment
Eyadat, Mohammad S. – Journal of Academic Administration in Higher Education, 2015
Information systems produce significant benefits to organizations. Therefore, organizations invest tremendous amount of money and time to obtain and manage information in order to maintain a high level of performance and to remain competitive. There are many factors that can impact the organizational information management and performance. One of…
Descriptors: Higher Education, Educational Administration, Administrator Role, Information Security
Peña, Christina – Workforce Data Quality Campaign, 2018
Employers are demanding higher skilled and better educated workers. Yet employer sentiment and the high default rate on student loans suggests a mismatch between the programs students are completing and the work they are able to find. To report on trends in postsecondary education, the U.S. Department of Education (ED) mostly relies on surveys of…
Descriptors: Employment Qualifications, Job Skills, Program Effectiveness, Postsecondary Education
Previous Page | Next Page »
Pages: 1 | 2