NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Burrell, Darrell Norman; Courtney-Dattola, Ashley; Burton, Sharon L.; Nobles, Calvin; Springs, Delores; Dawson, Maurice E. – International Journal of Information and Communication Technology Education, 2020
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own…
Descriptors: Internet, Instructional Improvement, Information Technology, Computer Security
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics