NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Trends in International…1
What Works Clearinghouse Rating
Showing 46 to 60 of 617 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2022
This Information Technology Specialist Resource List provides resources on understanding the role of information technology specialists in supporting school safety before, during, and after an emergency. Resources are organized into the following categories: (1) Cybersecurity and Cyber Safety Considerations for Schools and Districts; (2)…
Descriptors: Information Technology, Specialists, Role, School Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pentang, Jupeth T. – Online Submission, 2021
Globalizations across organizations are impacted by economic, political, legal, security, social, cultural, ecological, and technological dimensions among others. This paper presents the readings from relevant articles and studies pertaining to the relationship between technology and its dimensions with globalization. Globalization and…
Descriptors: Global Approach, Technology Education, Technology Uses in Education, Educational Trends
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pike, Ronald E.; Brown, Brandon; West, Tobi; Zentner, Aeron – Information Systems Education Journal, 2020
The aim of this report is to highlight efforts to develop a digital badging and e-portfolio environment that will illuminate and validate curricular, co-curricular, and extracurricular learning in cybersecurity. This effort includes Cal Poly Pomona and Coastline College, which are both designated as Centers of Academic Excellence in Cyber Defense…
Descriptors: Recognition (Achievement), Evaluation Methods, Portfolios (Background Materials), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Alma Foster; Natasha Ellis – Educational Psychology in Practice, 2024
This paper examines, from a psychological perspective, why some young people may diagnose themselves with a mental health condition or neurodevelopmental difference after engaging with TikTok content. The article joins the discourse around TikTok self-diagnosis among adolescents, which has circulated since 2022, and offers alternative…
Descriptors: Foreign Countries, Social Media, Adolescents, Clinical Diagnosis
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Peer reviewed Peer reviewed
Direct linkDirect link
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Keith Lee; Evo Popof; Chris Reykdal, Contributor – State Educational Technology Directors Association, 2024
The 2023-24 school year was a big year for educational technology. As the world of educational technology has evolved, so has SETDA's State EdTech Trends Survey. This year's survey and report feature new questions (which will likely become recurring questions) and some changes to old questions to reflect the mainstreaming of AI in K-12 education.…
Descriptors: Educational Technology, Educational Trends, Technology Uses in Education, Artificial Intelligence
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Office of Inspector General, US Department of Education, 2022
The U.S. Department of Education (Department) Office of Inspector General (OIG) Strategic Plan for Fiscal Years (FY) 2023 through 2028 represents the planned direction of the organization for FYs 2023-2028. It continues the 40-plus year commitment to the mission to promote the efficiency, effectiveness, and integrity of the Department's programs…
Descriptors: Strategic Planning, Educational Planning, Federal Government, Public Agencies
Office of Educational Technology, US Department of Education, 2023
This is the second in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Technology Uses in Education, Educational Technology, Rural Education
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  42