NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Trends in International…1
What Works Clearinghouse Rating
Showing 106 to 120 of 618 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dittrich, David – Research Ethics, 2015
This paper considers some of the ethical issues surrounding the study of malicious activity in social networks, specifically using a technique known as "social honeypots" combined with the use of deception. This is a potentially touchy area of study that is common to social and behavioral research that is well understood to fall within…
Descriptors: Social Networks, Social Media, Ethics, Deception
Michelle Tolbert; Jordan Hudson; Heather Claussen Erwin – Office of Career, Technical, and Adult Education, US Department of Education, 2015
This report is designed to inform federal, state, and local corrections and correctional education administrators as they explore ways to securely and cost-effectively provide advanced technologies in corrections facilities to help strengthen and expand educational and reentry services. It describes the current status of these technologies in…
Descriptors: Correctional Education, Technology Integration, Educational Technology, Administrators
Croft, Michelle – ACT, Inc., 2014
Given the transition from paper-and-pencil to computer administration, policymakers must update test security laws and policies to reflect the new threats to administration. There will likely always be a need for paper-and-pencil test administration security laws and policies, given that paper test copies may be needed as an accommodation or may…
Descriptors: Computer Assisted Testing, Computer Security, Information Security, Laws
Abilock, Rigele; Abilock, Debbie – Knowledge Quest, 2016
In April 2015, U.S. House Representatives Luke Messer and Jared Polis introduced the bipartisan Student Digital Privacy and Parental Rights Act of 2015, designed to significantly restrict how online education vendors can exploit the personal data of students who use their products. For some, the bill does not go far enough. It is evident that…
Descriptors: Privacy, Parent Rights, Federal Legislation, Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Office of Educational Technology, US Department of Education, 2023
This guide is designed to provide important resources and recommendations to support teacher implementation of digital learning. Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This guide will…
Descriptors: Teaching Guides, Teaching Methods, Technology Uses in Education, Learning Experience
Peer reviewed Peer reviewed
Direct linkDirect link
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Office of Educational Technology, US Department of Education, 2020
Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and weaknesses. Today's digital tools and resources support and enhance learning at home and in the…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Office of Educational Technology, US Department of Education, 2020
This guide is the Spanish version of the "Parent and Family Digital Learning Guide". Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Waguespack, Leslie J. – Information Systems Education Journal, 2014
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
Descriptors: Computer Security, Internet, Information Systems, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Morgan, Hani – Reading Improvement, 2015
Today an increasing number of teachers have successfully implemented blogging with students ranging from kindergarten through high school (Hungerford-Kresser, Wiggins, & Amaro-Jimenez, 2012). Although research on blogging is scant, existing studies suggest it can benefit students in various ways (Meinecke, Smith, & Lehmann-Willenbrock,…
Descriptors: Web 2.0 Technologies, Social Media, Cooperative Learning, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education
Pages: 1  |  ...  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  ...  |  42