Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 52 |
| Since 2017 (last 10 years) | 104 |
| Since 2007 (last 20 years) | 344 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Goldsborough, Reid | 6 |
| Panettieri, Joseph C. | 6 |
| Foster, Andrea L. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| Young, Jeffrey R. | 4 |
| Carlson, Scott | 3 |
| Carnevale, Dan | 3 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 16 |
| Practitioners | 15 |
| Media Staff | 14 |
| Administrators | 11 |
| Parents | 9 |
| Students | 6 |
| Policymakers | 5 |
| Support Staff | 2 |
| Community | 1 |
| Counselors | 1 |
Location
| California | 12 |
| Massachusetts | 11 |
| Maryland | 9 |
| Ohio | 9 |
| Canada | 8 |
| New York | 8 |
| North Carolina | 8 |
| Texas | 8 |
| United States | 7 |
| United Kingdom | 6 |
| Alabama | 5 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Trends in International… | 1 |
What Works Clearinghouse Rating
Straub, Jeremy – Journal of Educational Technology Systems, 2014
The development of software for spacecraft represents a particular challenge and is, in many ways, a worst case scenario from a design perspective. Spacecraft software must be "bulletproof" and operate for extended periods of time without user intervention. If the software fails, it cannot be manually serviced. Software failure may…
Descriptors: Comparative Analysis, Computer Software, Computer Science Education, Educational Technology
Guerry, Richard – Education Digest: Essential Readings Condensed for Quick Review, 2012
Most discussions about keeping kids safe online center around two issues: (1) With the rapid development and dissemination of digital technology, how can we stay ahead of what our students are doing?; and (2) What controls are available to prevent students from visiting inappropriate sites? These are reasonable questions, but they ignore two…
Descriptors: Internet, Accountability, Bullying, Computers
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
New England Board of Higher Education, 2018
Surveys of New England employers, college academic officers, and graduates find that many consider today's college graduates inadequately prepared for the world of work. In 2017, the New England Board of Higher Education convened the Commission on Higher Education & Employability, under the leadership of Rhode Island Governor Gina M. Raimondo.…
Descriptors: Education Work Relationship, Employment Potential, College Graduates, Career Readiness
Loughry, Misty L.; Ohland, Matthew W.; Woehr, David J. – Journal of Marketing Education, 2014
Colleges of business must meet assurance of learning requirements to gain or maintain AACSB accreditation under the new standards adopted April 8, 2013. Team skills are among the most important skills desired by recruiters, yet employers and scholars perceive that team skills are frequently deficient in college graduates. This article describes…
Descriptors: Higher Education, Business Administration Education, Accreditation (Institutions), Teamwork
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Kashiri, Erica; Troyan, Danielle – Industry and Higher Education, 2014
Partnerships between higher education and business have long been an important part of the academic landscape, but often they are based on shorter-term transactional objectives rather than on longer-term strategic goals. BHEF's National Higher Education and Workforce Initiative brings together business and academia at the institutional,…
Descriptors: School Business Relationship, Partnerships in Education, Computer Security, STEM Education
Poremba, Sue Marquette – Campus Technology, 2012
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Descriptors: Higher Education, Access to Computers, Computer Security, Safety
Mantiri, Franky – Universal Journal of Educational Research, 2014
This essay explores the use of computer technology and multimedia in students learning. Undoubtedly, the advent of computer technology has changed the way humans learn and do things. Moreover, "Computer has become standard equipment" (Bitter & Pierson, 2002) in everyday life. The ability to process data in a real time has helped…
Descriptors: Technology Uses in Education, Multimedia Materials, Information Technology, Computers
Dudek, Debra; Johnson, Nicola F. – Children's Literature in Education, 2011
When critics consider young people's practices within cyberspace, the focus is often on negative aspects, namely cyber-bullying, obsessive behaviour, and the lack of a balanced life. Such analyses, however, may miss the agency and empowerment young people experience not only to make decisions but to have some degree of control over their lives…
Descriptors: Novels, Adolescent Literature, Information Technology, Empowerment
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Nkotagu, Gabriel Hudson – Journal of International Students, 2011
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Descriptors: Internet, Deception, Online Vendors, Marketing
DeFranco, Joanna F. – Techniques: Connecting Education and Careers (J1), 2011
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Descriptors: Management Systems, Safety, Internet, Teachers

Peer reviewed
Direct link
