Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Technological Literacy | 3 |
Safety | 2 |
College Students | 1 |
Computer Networks | 1 |
Computer Use | 1 |
Confidentiality | 1 |
Digital Literacy | 1 |
Ecology | 1 |
Educational Technology | 1 |
Educational Trends | 1 |
More ▼ |
Author
Belessova, Damira | 1 |
Bosova, Lyudmila | 1 |
Brustoloni, Jose Carlos | 1 |
Buchanan, Rachel | 1 |
Ibashova, Almira | 1 |
Shaimerdenova, Guldana | 1 |
Smith, Shamus P. | 1 |
Southgate, Erica | 1 |
Publication Type
Journal Articles | 3 |
Reports - Evaluative | 3 |
Education Level
Elementary Education | 1 |
Audience
Location
Australia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Belessova, Damira; Ibashova, Almira; Bosova, Lyudmila; Shaimerdenova, Guldana – Open Education Studies, 2023
The article is an analysis of the current topic -- digitalization of the educational process. In the course of collecting and interpreting the known data, the authors cite the pedagogical foundations of digital literacy, the current state of digital learning and problems, and the prospects for the development of this direction in the future are…
Descriptors: Digital Literacy, Electronic Learning, Ecology, Educational Trends
Buchanan, Rachel; Southgate, Erica; Smith, Shamus P. – Global Studies of Childhood, 2019
Teachers are under increased pressure to teach children digital skills, and parents are having to manage children's online presence as well as their offline lives. Much of the discussion surrounding the issue of children's digital footprints highlights the potential present and future risks that children could be exposed to. While parents and…
Descriptors: Parent Attitudes, Teacher Attitudes, Technological Literacy, Foreign Countries
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments