NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Evaluative20
Journal Articles17
Information Analyses1
Tests/Questionnaires1
Audience
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Aimei Yang – Journalism and Mass Communication Educator, 2025
At the forefront of industries profoundly influenced by artificial intelligence (AI), public relations (PRs) are undergoing a transformative revolution. The increasing applications of AI in PRs are driving a demand for proficient practitioners. Recognizing this, PR educational institutions must adapt by delivering tailored AI education. Despite…
Descriptors: Artificial Intelligence, Public Relations, Programming, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Md Alimul Haque; Shameemul Haque; Sana Zeba; Kailash Kumar; Sultan Ahmad; Moidur Rahman; Senapathy Marisennayya; Laiq Ahmed – E-Learning and Digital Media, 2024
E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinence in the distance education system. Due to COVID-19, the online learning education system has become very popular. Most probably, all education systems have been using the IoT-based E-Learning system to continue the students' education without…
Descriptors: Electronic Learning, Internet, Information Networks, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Peer reviewed Peer reviewed
Direct linkDirect link
Belessova, Damira; Ibashova, Almira; Bosova, Lyudmila; Shaimerdenova, Guldana – Open Education Studies, 2023
The article is an analysis of the current topic -- digitalization of the educational process. In the course of collecting and interpreting the known data, the authors cite the pedagogical foundations of digital literacy, the current state of digital learning and problems, and the prospects for the development of this direction in the future are…
Descriptors: Digital Literacy, Electronic Learning, Ecology, Educational Trends
Arrington, Qui'Shonta – Online Submission, 2022
At present, technology is essential for everyone in their daily lives. The classroom is no exception to this rule. Within the last 15 years, the relationship between technology and education has grown tremendously. This article seeks to examine the impact of modern technology like LMS, 1:1 initiatives, and other computer-assisted teaching methods…
Descriptors: Influence of Technology, Technology Uses in Education, Educational Technology, Integrated Learning Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Isaac, Megan Lynn – Children's Literature in Education, 2020
Surveillance technologies are proliferating at an astonishing rate powered by practices that normalize surveillance. Children and young adults are especially prone to being surveilled since few people challenge the idea that protecting young people is a valuable goal. Yet, both E. Lockhart in "The Disreputable History of Frankie Landau…
Descriptors: Information Technology, Novels, Adolescent Literature, Gender Differences
Peer reviewed Peer reviewed
Direct linkDirect link
Komljenovic, Janja – Higher Education: The International Journal of Higher Education Research, 2022
Universities around the world are increasingly digitalising all of their operations, with the current COVID-19 pandemic speeding up otherwise steady developments. This article focuses on the political economy of higher education (HE) digitalisation and suggests a new research programme. I foreground three principal arguments, which are…
Descriptors: Media Adaptation, COVID-19, Pandemics, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Goger, Annelies; Parco, Allyson; Vegas, Emiliana – Brookings Institution, 2022
The rapid expansion of new technologies into every sector has contributed to the proliferation of alternative models of education, learning, and skill signaling in global labor markets. From digital badges to bootcamps to learning and employment records (LERs), a wide range of public, private, and nonprofit initiatives and platforms have emerged…
Descriptors: Technological Literacy, Information Technology, Credentials, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Peer reviewed Peer reviewed
Direct linkDirect link
Griffiths, Barry J. – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2015
For countries to remain competitive in the global economy, it is important to cultivate the next generation of native mathematicians. However, this goal has been increasingly challenging in the United States where, despite the tremendous increase in university enrollment during recent decades, the number of students studying mathematics has…
Descriptors: Summer Programs, Mathematics Education, Program Effectiveness, Academically Gifted
Peer reviewed Peer reviewed
Direct linkDirect link
Piattoeva, Nelli – European Educational Research Journal, 2016
This article discusses the effects of the datafication and digitalisation of education policy in the context of the Russian Federation. It taps into the policies and practices invented as a result of rising audit cultures and the scientisation and datafication of education governance. These processes turn sites of public examinations into sites of…
Descriptors: Foreign Countries, Data, Information Security, Video Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Previous Page | Next Page ยป
Pages: 1  |  2