NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive33
Journal Articles27
Guides - Non-Classroom3
Laws, Policies, & Programs
Family Educational Rights and…2
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 33 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Daire Maria Ni Uanachain; Lila Ibrahim Aouad – Thresholds in Education, 2025
This chapter investigates the dual role of Generative AI (GenAI) in providing support and feedback to students and in reshaping formative and summative educational assessments, addressing both the burgeoning opportunities for enhancing teaching methodologies and the associated ethical challenges. There is a focus on the necessity for balanced…
Descriptors: Artificial Intelligence, Computer Software, Technology Integration, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Sefton-Green, Julian – Discourse: Studies in the Cultural Politics of Education, 2022
In a context where current forms of governance and polity across many societies are engaging with 'platformisation', the paper argues that the utility and consequences of using a theory of pedagogy can provide a different way to explain how digital technology might 'determine' subjectivity. This paper describes the key process of how platforms…
Descriptors: Teaching Methods, Educational Theories, Privacy, Learning Management Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wanju – TechTrends: Linking Research and Practice to Improve Learning, 2023
A design case is a form of scholarly writing in which the author embarks on a reflective journey sharing rich descriptions of their design, design processes, challenges, etc. This paper presents two design cases that demonstrate how learning theories and instructional design concepts were purposefully incorporated in two instructional applications…
Descriptors: Learning Processes, Instructional Design, Learning Theories, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Christian Metaxas; Terry Greene; Jessica Malcolm; Njoki Muriithi; Esther Schacter; Mollie Schnurr – OTESSA Journal, 2024
As we enter a new age of technological innovation and subsequent educational instrumentation change, there is increasing demand for innovative methods that encourage student learning experiences in virtual, online spaces. ePortfolios and e-book projects are designed and owned by students and are centered within the student's learning. They provide…
Descriptors: Electronic Publishing, Educational Change, Books, Portfolios (Background Materials)
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Brown-Devlin, Natalie – Journal of Advertising Education, 2021
As the advertising industry continues to list analytical reasoning as a necessary skill for employment, more universities are including analytics into their advertising curriculum. This article outlines how I teach an analytics-focused course in a top-ranked advertising program. In this article, I briefly summarize each course module and describe…
Descriptors: Advertising, Teaching Methods, Data Analysis, College Faculty
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Payne, Bryson R. – Journal of Cybersecurity Education, Research and Practice, 2019
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semiautonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number…
Descriptors: Computer Security, Motor Vehicles, Information Security, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Office of Educational Technology, US Department of Education, 2024
The U.S. Department of Education is committed to supporting innovative advances in educational technology to improve teaching and learning across the nation's education systems and to support educators as they incorporate emerging technology into their learning communities. Artificial Intelligence (AI) in education is a complex and rapidly…
Descriptors: Equal Education, Artificial Intelligence, Computer Software, Technology Integration
Previous Page | Next Page ยป
Pages: 1  |  2  |  3