NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 42 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Bongiovanni, Ivano – Journal of Information Systems Education, 2022
In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Australian-based company tasked with assessing the information security practices of SkillPlat, a provider of apprenticeship and traineeship services. The case develops around the one-week visit paid by Selective Consulting to SkillPlat's headquarters,…
Descriptors: Information Security, Role Playing, Teaching Methods, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Kumar, Priya C.; Byrne, Virginia L. – Information and Learning Sciences, 2022
Purpose: Existing privacy-related educational materials are not situated in privacy theory, making it hard to understand what specifically children learn about privacy. This article aims to offer learning objectives and guidance grounded in theories of privacy and learning to serve as a foundation for privacy literacy efforts.…
Descriptors: Privacy, Information Literacy, Information Security, Literacy Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Daire Maria Ni Uanachain; Lila Ibrahim Aouad – Thresholds in Education, 2025
This chapter investigates the dual role of Generative AI (GenAI) in providing support and feedback to students and in reshaping formative and summative educational assessments, addressing both the burgeoning opportunities for enhancing teaching methodologies and the associated ethical challenges. There is a focus on the necessity for balanced…
Descriptors: Artificial Intelligence, Computer Software, Technology Integration, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lauer, Thomas W. – Information Systems Education Journal, 2020
This paper gives four examples of the use of short speculative fiction for teaching different aspects of information privacy. Information privacy is multi-faceted; as an area of study it intersects with a number of fields. A non-exhaustive list could include: law, information systems, decision science, marketing, management, philosophy,…
Descriptors: Teaching Methods, Fiction, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Sefton-Green, Julian – Discourse: Studies in the Cultural Politics of Education, 2022
In a context where current forms of governance and polity across many societies are engaging with 'platformisation', the paper argues that the utility and consequences of using a theory of pedagogy can provide a different way to explain how digital technology might 'determine' subjectivity. This paper describes the key process of how platforms…
Descriptors: Teaching Methods, Educational Theories, Privacy, Learning Management Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wanju – TechTrends: Linking Research and Practice to Improve Learning, 2023
A design case is a form of scholarly writing in which the author embarks on a reflective journey sharing rich descriptions of their design, design processes, challenges, etc. This paper presents two design cases that demonstrate how learning theories and instructional design concepts were purposefully incorporated in two instructional applications…
Descriptors: Learning Processes, Instructional Design, Learning Theories, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Christian Metaxas; Terry Greene; Jessica Malcolm; Njoki Muriithi; Esther Schacter; Mollie Schnurr – OTESSA Journal, 2024
As we enter a new age of technological innovation and subsequent educational instrumentation change, there is increasing demand for innovative methods that encourage student learning experiences in virtual, online spaces. ePortfolios and e-book projects are designed and owned by students and are centered within the student's learning. They provide…
Descriptors: Electronic Publishing, Educational Change, Books, Portfolios (Background Materials)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tureniyazova, Asiya Ibragimovna – Research in Social Sciences and Technology, 2019
To date, hundreds of advanced teaching methods, such as game methods, have been developed, and these problem-based learning methods are widely used in education. Most of these technologies are based on the principles of student-centered and participatory learning. These interactive methods allow the learner to master the necessary professional…
Descriptors: Teaching Methods, Visual Aids, Information Technology, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Previous Page | Next Page »
Pages: 1  |  2  |  3