NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 56 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Alakrimi, Mahmoud M. – Online Submission, 2022
The Documentation and Information Department of all Libyan universities is working on developing the university's website to suit all users with their different experiences and ways of interacting, so it is necessary to test the ease of use of these sites. That is why the researcher seeks to evaluate and compare his performance of these sites and…
Descriptors: Universities, Web Sites, Information Dissemination, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
PDF on ERIC Download full text
He, Jonathan; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails,…
Descriptors: Information Security, Computer Security, Computer Software, Summer Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Zimmerle, Joanna C.; Wall, Anne S. – Computers in the Schools, 2019
Although the Children's Online Privacy Protection Act (COPPA) was enacted 20 years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children's personal data. Lengthy and oftentimes ambiguous policies…
Descriptors: Privacy, Computer Security, Computer Oriented Programs, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Coogan, John F. – Journal of Electronic Resources Librarianship, 2019
Resolving user access issues is inherent in managing electronic resources in libraries. The University of Maryland University College (UMUC) Library, situated within a predominantly distance learning-centered institution, has developed a series of web-based technical help pages to facilitate resolution of typical issues reported by its…
Descriptors: Access to Information, Users (Information), Information Management, Technical Support
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Cavus, Nadire; Ercag, Erinc – British Journal of Educational Technology, 2016
There has been an increase in the vulnerability in Internet security, and the unconscious usage of the Internet is a very important issue throughout the world as it is in Cyprus today. The best way to solve such an issue would be to make people aware of this situation. Based on this idea, teachers should firstly be trained to use the Internet in a…
Descriptors: Foreign Countries, Self Efficacy, Internet, Safety
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
McMullan, John L.; Kervin, Melissa – International Journal of Mental Health and Addiction, 2012
This study examines the web design and engineering, advertising and marketing, and pedagogical features present at a random sample of 71 international poker sites obtained from the Casino City directory in the summer of 2009. We coded for 22 variables related to access, appeal, player protection, customer services, on-site security, use of images,…
Descriptors: Addictive Behavior, Familiarity, Advertising, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4