Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Security | 12 |
Decision Making | 12 |
Information Security | 5 |
Case Studies | 4 |
Privacy | 4 |
Computer Software | 3 |
Feedback (Response) | 3 |
Costs | 2 |
Data | 2 |
Identification | 2 |
Instructional Design | 2 |
More ▼ |
Source
Author
Allison, Jordan | 1 |
Alper Yayla | 1 |
Asfour, Ali | 1 |
Bryson R. Payne | 1 |
Cathryn Allen | 1 |
Chuck Robertson | 1 |
Cutts, Quintin | 1 |
Dark, Melissa | 1 |
Grundy, John | 1 |
J. R. Lockwood | 1 |
Kumar, Ajoy | 1 |
More ▼ |
Publication Type
Journal Articles | 12 |
Reports - Research | 7 |
Reports - Descriptive | 4 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Hawaii | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
William Belzak; J. R. Lockwood; Yigal Attali – Educational Measurement: Issues and Practice, 2024
Remote proctoring, or monitoring test takers through internet-based, video-recording software, has become critical for maintaining test security on high-stakes assessments. The main role of remote proctors is to make judgments about test takers' behaviors and decide whether these behaviors constitute rule violations. Variability in proctor…
Descriptors: Computer Security, High Stakes Tests, English (Second Language), Second Language Learning
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Asfour, Ali; Zain, Samer; Salleh, Norsaremah; Grundy, John – International Journal of Technology in Education and Science, 2019
Agile development methods have been proposed as a natural fit for mobile app development contexts. Despite many studies addressing the adoption of agile methods for traditional web and desktop applications, there is a lack of studies of how mobile app development teams can adopt agile methods and the challenges they are facing. Our study explores…
Descriptors: Computer Software, Case Studies, Guidance, Quality Assurance
Pollock, Tommy; Levy, Yair; Li, Wei; Kumar, Ajoy – Journal of Cybersecurity Education, Research and Practice, 2022
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research…
Descriptors: Decision Making, Information Security, Specialists, Users (Information)
Smith, Catherine L. – Information Research: An International Electronic Journal, 2016
Introduction: The analysis of detailed interaction records is fundamental to development of user-centred systems. Researchers seeking such data must recruit volunteers willing to allow tracking of their interactions. This study examines privacy and trust attitudes in the intent to volunteer for research requiring installation of tracking software.…
Descriptors: Privacy, Trust (Psychology), Data Analysis, Information Security
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks

McKimmy, Paul B. – International Journal of Instructional Media, 2005
In April 2002, the Technology Advisory Committee of the University of Hawaii-Manoa College of Education (COE) prioritized the upgrade of existing instructional computer labs. Following several weeks of research and discussion, a decision was made to support wireless and mobile technologies during the upgrade. In June 2002, the first of three…
Descriptors: Resource Allocation, Costs, Educational Technology, Telecommunications