Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Security | 12 |
Statistical Analysis | 12 |
Internet | 5 |
Foreign Countries | 4 |
Information Security | 4 |
Student Attitudes | 4 |
Student Surveys | 4 |
Comparative Analysis | 3 |
Data Analysis | 3 |
Electronic Learning | 3 |
Privacy | 3 |
More ▼ |
Source
Author
Abdollah, Mohd Faizal | 1 |
Annessi, Robert | 1 |
Bernhardt, Valentin | 1 |
Boutnaru, Shlomi | 1 |
Chaplik, Andrew M. | 1 |
Frkat, Davor | 1 |
Hamman, Seth T. | 1 |
Hershkovitz, Arnon | 1 |
Hopkinson, Kenneth M. | 1 |
Hou, Huei-Tse | 1 |
Ilic, Dragan | 1 |
More ▼ |
Publication Type
Journal Articles | 12 |
Reports - Research | 8 |
Reports - Evaluative | 3 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 4 |
Middle Schools | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
High Schools | 1 |
Intermediate Grades | 1 |
More ▼ |
Audience
Location
Austria (Vienna) | 1 |
Israel | 1 |
Michigan | 1 |
Taiwan | 1 |
Turkey | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yilmaz, Ramazan; Karaoglan Yilmaz, F. Gizem; Özturk, H. Tugba; Karademir, Tugra – Online Submission, 2017
Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome…
Descriptors: Foreign Countries, Secondary School Students, Computer Use, Internet
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Martin, Florence; Wang, Chuang; Petty, Teresa; Wang, Weichao; Wilkins, Patti – Educational Technology & Society, 2018
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and "bring your own technology" initiatives, attention to these topics is becoming increasingly important. A total of 593…
Descriptors: Middle School Students, Social Media, Student Surveys, Bullying
Mahalingam, Sheila; Abdollah, Mohd Faizal; bin Sahibuddin, Shahrin – International Journal of Distance Education Technologies, 2014
Mobile Learning has a potential to improve efficiency in the education sector and expand educational opportunities to underserved remote area in higher learning institutions. However there are multi challenges in different altitude faced when introducing and implementing m-learning. Despite the evolution of technology changes in education,…
Descriptors: Electronic Learning, Computer Security, Reliability, Computer System Design
Smith, Catherine L. – Information Research: An International Electronic Journal, 2016
Introduction: The analysis of detailed interaction records is fundamental to development of user-centred systems. Researchers seeking such data must recruit volunteers willing to allow tracking of their interactions. This study examines privacy and trust attitudes in the intent to volunteer for research requiring installation of tracking software.…
Descriptors: Privacy, Trust (Psychology), Data Analysis, Information Security
Sun, Jerry Chih-Yuan; Kuo, Cian-Yu; Hou, Huei-Tse; Lin, Yu-Yan – Educational Technology & Society, 2017
The purposes of this study were to provide a game-based anti-phishing lesson to 110 elementary school students in Taiwan, explore their learning behavioral patterns, and investigate the effects of the flow states on their learning behavioral patterns and learning achievement. The study recorded behaviour logs, and applied a pre- and post-test on…
Descriptors: Educational Games, Electronic Learning, Educational Technology, Elementary School Students
Boutnaru, Shlomi; Hershkovitz, Arnon – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2015
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…
Descriptors: Computer Software, Computer Security, Programming Languages, Computer Science Education
Maloney, Stephen; Moss, Alan; Ilic, Dragan – Advances in Health Sciences Education, 2014
Social Networking Sites (SNS) have seen exponential growth in recent years. The high utilisation of SNS by tertiary students makes them an attractive tool for educational institutions. This study aims to identify health professional students' use and behaviours with SNS, including students' perspectives on potential applications within…
Descriptors: Social Networks, Electronic Learning, Technology Uses in Education, Health Education
Pusey, Portia; Sadera, William A. – Journal of Digital Learning in Teacher Education, 2012
In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related and Internet-capable technologies into instructional settings to improve student learning. Many presume that preservice teachers have the knowledge to competently model and teach issues of safety when working with these devices as…
Descriptors: Preservice Teacher Education, Preservice Teachers, Standards, Laws
Ockey, Gary J. – Modern Language Journal, 2009
Computer-based testing (CBT) to assess second language ability has undergone remarkable development since Garret (1991) described its purpose as "the computerized administration of conventional tests" in "The Modern Language Journal." For instance, CBT has made possible the delivery of more authentic tests than traditional paper-and-pencil tests.…
Descriptors: Second Language Learning, Adaptive Testing, Computer Assisted Testing, Language Aptitude
Rothschild, Daniel; Rezmierski, Virginia – EDUCAUSE Quarterly, 2004
The Computer Incident Factor Analysis and Categorization (CIFAC) Project at the University of Michigan began in September 2003 with grants from EDUCAUSE and the National Science Foundation (NSF). The project's primary goal is to create a best-practices security framework for colleges and universities based on rigorous quantitative analysis of…
Descriptors: Computer Security, Colleges, Statistical Analysis, Literature Reviews