Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 25 |
Descriptor
Source
Author
Ackerman, Amy S. | 1 |
Adrian Curaj | 1 |
Alina Iura | 1 |
Alma Foster | 1 |
Ambraziene, Danute | 1 |
Annessi, Robert | 1 |
Astrom, Peik | 1 |
Beevers, C. E. | 1 |
Bergstrom, Laura | 1 |
Bernard Ngalim | 1 |
Bernhardt, Valentin | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 40 |
Journal Articles | 32 |
Speeches/Meeting Papers | 3 |
Guides - Non-Classroom | 2 |
Opinion Papers | 2 |
Numerical/Quantitative Data | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 18 |
Postsecondary Education | 10 |
Elementary Secondary Education | 4 |
Adult Education | 3 |
Elementary Education | 2 |
Middle Schools | 2 |
Early Childhood Education | 1 |
Preschool Education | 1 |
Audience
Practitioners | 3 |
Administrators | 1 |
Location
Canada | 8 |
United Kingdom | 6 |
United States | 4 |
Australia | 3 |
California | 2 |
China | 2 |
Spain | 2 |
United Kingdom (England) | 2 |
Alabama | 1 |
Austria (Vienna) | 1 |
Cameroon | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
Mari-Liisa Parder; Pieter Gryffroy; Marten Juurik – Research Ethics, 2024
The growing importance of researching online activities, such as cyber-deviance and cyber-crime, as well as the use of online tools (e.g. questionnaires, games, and other interactive tools) has created new ethical and legal challenges for researchers, which can be even more complicated when researching adolescents. In this article, we highlight…
Descriptors: Foreign Countries, Crime Prevention, Ethics, Computer Security
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Chapman, John – Higher Education Policy Institute, 2019
Higher education regularly experiences cyber attacks. Organisations that do not adequately protect themselves risk the loss or exposure of personal student and staff data and also commercial, institutional and research data that are valuable to cyber criminals operating domestically and internationally. This paper discusses: (1) the current…
Descriptors: Higher Education, Internet, Information Security, Computer Security
Brar, Raj – BU Journal of Graduate Studies in Education, 2022
Social media is an important part of all of our lives. However, there is no requirement for students in Manitoba to receive formalized education in regards to social media and its usage in the K-12 Canadian curriculum instruction. Such formalized education is extremely important for adolescents to understand the multiple facets of social media…
Descriptors: Social Media, Educational Technology, Adolescents, Foreign Countries
Alma Foster; Natasha Ellis – Educational Psychology in Practice, 2024
This paper examines, from a psychological perspective, why some young people may diagnose themselves with a mental health condition or neurodevelopmental difference after engaging with TikTok content. The article joins the discourse around TikTok self-diagnosis among adolescents, which has circulated since 2022, and offers alternative…
Descriptors: Foreign Countries, Social Media, Adolescents, Clinical Diagnosis
Johnson, Clare – Higher Education Pedagogies, 2019
Higher Education institutions understand that there is a need to embed professional skills within degree programmes. However, evidence shows that graduates, whilst having developed good theoretical knowledge, lack experience and confidence when entering the workplace. Employers view the importance of degree-related skills as only a part of the…
Descriptors: Foreign Countries, Computer Security, Student Projects, Active Learning
Adrian Curaj; Cezar Hâj; Cosmin Holeab; Irina Geanta; Alina Iura; Dorin Cote?; Oana ?în?ar – European Union, 2025
The present report overseen by the Executive Agency for Higher Education, Research, Development and Innovation Funding (UEFISCDI) on behalf of the European Commission and the European Education and Culture Executive Agency as part of the contract for the implementation of the European Digital Education Hub, is the third report in a series…
Descriptors: Foreign Countries, Educational Innovation, Electronic Learning, Educational Practices
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Murray, Neil – Language Assessment Quarterly, 2014
The growing number of students from increasingly diverse backgrounds--both English speaking and non-English speaking--entering English-medium institutions of higher education has put unprecedented pressure on universities to think creatively about efficient and cost-effective ways of identifying students at risk linguistically. Having done so,…
Descriptors: Language Tests, English (Second Language), Second Language Learning, Models
Miseviciene, Regina; Ambraziene, Danute; Tuminauskas, Raimundas; Pažereckas, Nerijus – Informatics in Education, 2012
Many factors influence education nowadays. Educational institutions are faced with budget cuttings, outdated IT, data security management and the willingness to integrate remote learning at home. Virtualization technologies provide innovative solutions to the problems. The paper presents an original educational infrastructure using virtualization…
Descriptors: Computer Simulation, Universities, College Students, College Faculty
Promoting Awareness of Internet Safety in Taiwan In-Service Teacher Education: A Ten-Year Experience
Chou, Chien; Peng, Hsinyi – Internet and Higher Education, 2011
The Internet has changed many people's lives, in both positive and negative ways. The Taiwan Ministry of Education has recognized the Internet's possible risks and has initiated the island-wide "Teacher Awareness of Internet Safety" (TAIS) project for elementary and middle school teachers since 2000. TAIS project is the first…
Descriptors: Safety, Foreign Countries, Middle School Teachers, Internet
Ackerman, Amy S.; Krupp, Melissa L. – International Association for Development of the Information Society, 2012
Although school budgets have plummeted due to federal and state funding reductions, adopting Bring Your Own Technology (BYOT), may address monetary tightening while simultaneously infusing 21st century learning. Implementing BYOT may provide real, rigorous, and relevant learning for the students while posing higher-order thinking questions from…
Descriptors: Foreign Countries, Influence of Technology, Technology Uses in Education, Computer Security
Vance, Erik – Chronicle of Higher Education, 2007
In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so…
Descriptors: Foreign Countries, Computer Security, Courses
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Kirkham, Thomas; Winfield, Sandra; Smallwood, Angela; Coolin, Kirstie; Wood, Stuart; Searchwell, Louis – Educational Technology & Society, 2009
This paper presents a platform on which a new generation of applications targeted to aid the self-organised learner can be presented. The new application is enabled by innovations in trust-based security of data built upon emerging infrastructures to aid federated data access in the UK education sector. Within the proposed architecture, users and…
Descriptors: Architecture, Learning Processes, Foreign Countries, Educational Technology