Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 14 |
Since 2016 (last 10 years) | 36 |
Since 2006 (last 20 years) | 69 |
Descriptor
Source
Author
Grajek, Susan | 2 |
Kruck, S. E. | 2 |
A. Renee Staton | 1 |
A., Sharmila | 1 |
Agerwala, Tilak | 1 |
Andy Johnson | 1 |
Aparna Satapathy | 1 |
Atul Bhatt | 1 |
Bangert-Drowns, Robert | 1 |
Bartolacci, Mike | 1 |
Baykal, Adnan | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 69 |
Journal Articles | 41 |
Speeches/Meeting Papers | 3 |
Tests/Questionnaires | 2 |
Books | 1 |
Reference Materials -… | 1 |
Education Level
Higher Education | 47 |
Postsecondary Education | 42 |
Elementary Secondary Education | 21 |
Early Childhood Education | 9 |
Elementary Education | 9 |
Kindergarten | 9 |
Primary Education | 9 |
Two Year Colleges | 3 |
Audience
Policymakers | 1 |
Location
New York | 3 |
North Carolina | 2 |
United States | 2 |
Arizona | 1 |
Arkansas | 1 |
Asia | 1 |
Canada | 1 |
District of Columbia | 1 |
Europe | 1 |
European Union | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Garg, Anuj; A., Sharmila; Kumar, Pramod; Madhukar, Mani; Loyola-González, Octavio; Kumar, Manoj – Education and Information Technologies, 2022
Nowadays, internet technology plays a vital role in all the fields of our daily lives ranging from the world economy, professional careers, higher education, and almost all the spheres that are deeply impacted. In the current situation, due to COVID-19, the dependence on the Internet for almost everything, including learning, getting daily needs,…
Descriptors: Internet, Electronic Learning, Online Courses, Educational Quality
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Saroja Kumar Panda; Atul Bhatt; Aparna Satapathy – New Review of Academic Librarianship, 2024
The paper aims to discuss ChatGPT and its role in academic libraries. It identifies the key areas where ChatGPT can be implemented in libraries to improve various services and the overall work experience of academics, along with the risk factors associated with ChatGPT. Research finds that ChatGPT can be aided with many library services such as…
Descriptors: Artificial Intelligence, Technology Uses in Education, Academic Libraries, Library Services
Andy Johnson; Shawn Miller – Advanced Distributed Learning Initiative, 2023
The purpose of this document is to provide techniques to assist Department of Defense (DoD) acquisition personnel with the integration of learning technology standards into their Information Technology acquisition processes. This document supports Department of Defense Instruction (DoDI) 1322.26 and the updated DoDI 1322.26 references. This…
Descriptors: Government Employees, Lifelong Learning, Data Collection, Learning Activities
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Bottum, Jim; Smith, Dale; Grandon, Alex; Hofmann, Russell – Tribal College Journal of American Indian Higher Education, 2022
For a tribal college or university (TCU), cyberinfrastructure includes not only the campus computer labs, servers, routers, and software applications, but the classroom technology, research laboratories, library facilities, and personnel who operate and maintain these resources. The cyberinfrastructure at a TCU is a foundational tool that ties the…
Descriptors: Capacity Building, Information Technology, Computer Networks, Tribally Controlled Education
Ware, Jennifer – New England Journal of Higher Education, 2018
The author suggests that inevitably, technology will cause harm, and she questions whom to hold responsible. The person who created the program or machine? The operator? The manufacturer? The marketer? The politician who passed legislation making it available? When bad things happen, people tend to look for a particular individual to blame,…
Descriptors: Information Technology, Safety, Information Security, Technological Advancement
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2022
This Information Technology Specialist Resource List provides resources on understanding the role of information technology specialists in supporting school safety before, during, and after an emergency. Resources are organized into the following categories: (1) Cybersecurity and Cyber Safety Considerations for Schools and Districts; (2)…
Descriptors: Information Technology, Specialists, Role, School Safety
Cacicio, Sarah; Tinsley, Brian; Miller, Antionette; Luke Luna, Christina – Digital Promise, 2022
Learning and Employment Records (LERs) require careful, deliberate design to ensure that workers benefit from their adoption and use. If designed without the inclusion of individuals who are most marginalized in the workforce, LERs could reproduce existing inequities in the talent pipeline. Digital Promise collaborated with workers in frontline…
Descriptors: Information Technology, Credentials, Information Storage, Influence of Technology
Tureniyazova, Asiya Ibragimovna – Research in Social Sciences and Technology, 2019
To date, hundreds of advanced teaching methods, such as game methods, have been developed, and these problem-based learning methods are widely used in education. Most of these technologies are based on the principles of student-centered and participatory learning. These interactive methods allow the learner to master the necessary professional…
Descriptors: Teaching Methods, Visual Aids, Information Technology, Computer Science Education
Grajek, Susan – Change: The Magazine of Higher Learning, 2022
Imagine an expanding higher education. The acceptance of and enthusiasm for online and hybrid courses have been routinized and monetized, and alternative microcredentialing and lifelong learning programs have provided institutions with expanded revenue streams. EDUCAUSE's Top 10 IT issues for 2022, which are presented in this article, provide a…
Descriptors: Information Technology, Technology Uses in Education, Higher Education, Educational Change
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Clark, Ulku; Stoker, Geoff; Vetter, Ron – Information Systems Education Journal, 2020
The rising number and cost of cybersecurity attacks justifies continued strong interest in the National Security Agency (NSA) and Department of Homeland Security (DHS) jointly sponsored program for National Centers of Academic Excellence in Cyber Defense (CAE-CD). After briefly outlining the current state of the cybersecurity challenge, this…
Descriptors: Educational Change, Information Security, Public Agencies, National Security