Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 18 |
Descriptor
Computer Security | 19 |
Data Collection | 19 |
Information Security | 11 |
Data Analysis | 6 |
Ethics | 6 |
Access to Information | 5 |
Foreign Countries | 5 |
Information Technology | 5 |
Internet | 5 |
Privacy | 5 |
Computer Software | 4 |
More ▼ |
Source
Author
Brooks, Rochelle | 1 |
Brown, Justine | 1 |
Casagrande, Marco | 1 |
Celeda, Pavel | 1 |
Chou, Chien | 1 |
Christine Wildman | 1 |
Conti, Mauro | 1 |
Di Gangi, Paul M. | 1 |
Edwards, John | 1 |
Fedeli, Monica | 1 |
Goh, Samuel H. | 1 |
More ▼ |
Publication Type
Journal Articles | 19 |
Reports - Descriptive | 8 |
Reports - Research | 8 |
Reports - Evaluative | 2 |
Opinion Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Elementary Education | 2 |
High Schools | 2 |
Secondary Education | 2 |
Elementary Secondary Education | 1 |
Middle Schools | 1 |
Audience
Location
Canada | 2 |
Australia | 1 |
Italy | 1 |
Ohio | 1 |
South Carolina | 1 |
Taiwan | 1 |
United States | 1 |
Utah | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Pangrazio, Luci; Selwyn, Neil – Pedagogy, Culture and Society, 2021
The ongoing 'datafication' of contemporary society has a number of implications for schools and schooling. One is the increasing calls for schools to help develop young people's understandings about the role that digital data now plays in their everyday lives -- especially in terms of the 'data economy' and 'surveillance capitalism'. Reporting on…
Descriptors: Data Collection, Data Analysis, Technology Uses in Education, Data Processing
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Pruitt, Kobie – State Education Standard, 2016
Just as adults' personal lives and data are increasingly inhabiting online spaces, so are students. While this shift brings many benefits and the possibility of learning tailored to individual students' needs, it is also brings new challenges. Students create an electronic trail of information that creates an obvious concern: How can they enjoy…
Descriptors: Student Records, Safety, Computer Security, Information Security
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Kligiene, Stanislava Nerute – Informatics in Education, 2012
The paper surveys the risks and benefits which the user faces in the networked environment and how those challenges can be overcome. The question is how to measure the potential or benefits of such a complex phenomenon--the collaborative cross-domains in social media. As one of the solutions we propose to consider this in the context of digital…
Descriptors: Social Networks, Data Collection, Privacy, Computer Mediated Communication
Wu, Yejun – Journal of Education for Library and Information Science, 2013
This paper addresses the curriculum overlap and gap between LIS education and intelligence education by analyzing the content of the websites of the intelligence education programs and courses in 27 representative intelligence education universities in the United States, and the intelligence-related programs and courses in the 56 LIS programs in…
Descriptors: Library Science, Library Education, Web Sites, Computer Literacy
Promoting Awareness of Internet Safety in Taiwan In-Service Teacher Education: A Ten-Year Experience
Chou, Chien; Peng, Hsinyi – Internet and Higher Education, 2011
The Internet has changed many people's lives, in both positive and negative ways. The Taiwan Ministry of Education has recognized the Internet's possible risks and has initiated the island-wide "Teacher Awareness of Internet Safety" (TAIS) project for elementary and middle school teachers since 2000. TAIS project is the first…
Descriptors: Safety, Foreign Countries, Middle School Teachers, Internet
Previous Page | Next Page »
Pages: 1 | 2