Publication Date
In 2025 | 3 |
Since 2024 | 9 |
Since 2021 (last 5 years) | 19 |
Since 2016 (last 10 years) | 30 |
Since 2006 (last 20 years) | 37 |
Descriptor
Information Security | 37 |
Program Effectiveness | 37 |
Computer Security | 14 |
Foreign Countries | 14 |
Privacy | 10 |
Knowledge Level | 9 |
Student Attitudes | 7 |
Teaching Methods | 7 |
College Students | 6 |
Information Technology | 6 |
Internet | 6 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 37 |
Reports - Research | 32 |
Tests/Questionnaires | 4 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Information Analyses | 1 |
Education Level
Audience
Location
Canada | 2 |
Nigeria | 2 |
North Carolina | 2 |
Australia | 1 |
Florida | 1 |
Georgia | 1 |
Hong Kong | 1 |
Indonesia | 1 |
Ireland | 1 |
Oman | 1 |
Saudi Arabia | 1 |
More ▼ |
Laws, Policies, & Programs
Race to the Top | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Estel·la Ramírez-Baraldes; Daniel García-Gutiérrez; Cristina García-Salido – European Journal of Education, 2025
To explore the opportunities and challenges of artificial intelligence (AI) in nursing and its impact. Bibliographic review using Arksey and O'Malley's framework, enhanced by Levac, Colquhoun and O'Brien and following PRISMA guidelines, including qualitative and mixed studies. MeSH terms and keywords such as nursing education and ethical…
Descriptors: Artificial Intelligence, Nursing, Nursing Education, Barriers
Christine Wusylko; Zhen Xu; Kara M. Dawson; Pavlo D. Antonenko; Do Hyong Koh; Minyoung Lee; Amber E. Benedict; Swarup Bhunia – Journal of Research on Technology in Education, 2024
This article describes the use of a comic book to anchor a cryptology and cybersecurity curriculum for upper elementary students. Perceptions about the comic book from 138 students across 11 afterschool programs were examined using survey, classroom observation, and interviews. Data analysis revealed that the comic book created a…
Descriptors: Technology, Computer Security, Information Security, Cartoons
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Kwun Hung Li; Dickson K.W. Chiu; Elaine W.S. Kong; Kevin K.W. Ho – Education & Training, 2025
Purpose: This research investigates mobile security awareness among university students in Hong Kong, who increasingly rely on mobile devices for their daily activities and academic needs. This research seeks to inform targeted educational strategies and policies to enhance mobile security practices among young adults, particularly in regions…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, College Students
Al-Shamli, Malik; Al Hijji, Khalfan Zahran; Shaikh, Abdul Khalique – Education and Information Technologies, 2023
This paper aims at reviewing Information Security Awareness (ISA) practices in general and at Omani Government Agencies (OGA) in particular. It also explores the concerns and challenges that may affect their implementation, and the reasons why ISA practices remained problematic for more than a decade at the OGAs. To inform the aim of this…
Descriptors: Foreign Countries, Information Security, Federal Government, Public Agencies
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Maya Usher; Miri Barak – International Journal of STEM Education, 2024
As artificial intelligence (AI) technology rapidly advances, it becomes imperative to equip students with tools to navigate through the many intricate ethical considerations surrounding its development and use. Despite growing recognition of this necessity, the integration of AI ethics into higher education curricula remains limited. This paucity…
Descriptors: Artificial Intelligence, Ethics, Ethical Instruction, Online Courses
Frontera, Paul J.; Rodriguez-Seda, Erick J. – IEEE Transactions on Education, 2021
Contribution: This article presents a project-based learning (PBL) activity for use in the instruction of network attacks on cyber-physical systems. Student learning is analyzed to determine the project's contribution to learning outcome attainment. Background: The literature contains a significant amount of research on the benefits of PBL as a…
Descriptors: Student Projects, Teaching Methods, Computer Security, Information Security
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Moon, Tyler; Abegaz, Tamirat; Payne, Bryson; Salimi, Abi – Journal of Cybersecurity Education, Research and Practice, 2020
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal…
Descriptors: Information Security, Game Based Learning, Computer Security, Knowledge Level
Florence Martin; Doreen Mushi; Siyu Long; Julie Bacak; Drew Polly; Weichao Wang; Lynn Ahlgrim-Delzell – Journal of Technology and Teacher Education, 2024
Digital safety involves protecting oneself, and one's personal information to mitigate the risks that are inherently associated with using digital technologies. This study employed a multi-method design to explore 26 inservice and preservice elementary teacher experiences from attending a professional development on digital safety and facilitating…
Descriptors: Safety, Preservice Teachers, Elementary School Teachers, Summer Programs
Mite Setiansah; Nuryanti Nuryanti; Edi Santoso; Agus Ganjar Runtiko; Wiwik Novianti – Journal of Media Literacy Education, 2023
Digital literacy education is essential for everyone, including seniors to sustain their quality of life. The Digital Academy for Seniors aims to instill digital skills among seniors through a non-formal learning program. This qualitative research aimed to provide a comprehensive description of how the program can develop digital resilience and…
Descriptors: Foreign Countries, Older Adults, Technological Literacy, Quality of Life
Ahadi Haji Mohd Nasir; Ely Salwana; Mohammad Nazir Ahmad – Journal of Information Technology Education: Innovations in Practice, 2025
Aim/Purpose: This paper addresses the lack of a standardized approach to information dashboard design and the absence of integrated Information Governance (IG) principles in this context. Background: This study addresses the critical role of IG principles in ensuring dashboards are reliable, secure, and effective. By integrating IG principles into…
Descriptors: Information Management, Information Policy, Information Dissemination, Information Systems
Virginia Clinton-Lisell; Alison E. Kelly – International Journal of Technology in Education and Science, 2024
The use of online homework systems that require the purchase of an access code has become widespread. The purpose of this study is to examine student experiences with and perceptions of online homework systems with access codes. Postsecondary students (N = 966) completed a survey about the financial costs, perceptions of quality, engagement with,…
Descriptors: Homework, Educational Technology, Technology Uses in Education, Student Experience
MacNamara, Noirin; Mackle, Danielle; Trew, Johanne Devlin; Pierson, Claire; Bloomer, Fiona – International Journal of Social Research Methodology, 2021
Internet-mediated focus groups (FGs) have become a feature of qualitative research over the last decade; however, their use within social sciences has been adopted at a slower pace than other disciplines. This paper considers the advantages and disadvantages of internet-mediated FGs and reflects on their use for researching culturally sensitive…
Descriptors: Internet, Focus Groups, Program Effectiveness, Asynchronous Communication