NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 202535
Since 2024121
Since 2021 (last 5 years)325
Since 2016 (last 10 years)500
What Works Clearinghouse Rating
Showing 1 to 15 of 500 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Andres Felipe Zambrano; Shreya Singhal; Maciej Pankiewicz; Ryan Shaun Baker; Chelsea Porter; Xiner Liu – Information and Learning Sciences, 2025
Purpose: This study aims to evaluate the effectiveness of three large language models (LLMs), GPT-4o, Llama 3.3 70B and Llama 3.1 8B, in redacting personally identifying information (PII) from forum data in massive open online courses (MOOCs). Design/methodology/approach: Forum posts from students enrolled in nine MOOCs were redacted by three…
Descriptors: Artificial Intelligence, Identification, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Peer reviewed Peer reviewed
Direct linkDirect link
Tian Luo; Pauline S. Muljana; Xinyue Ren; Dara Young – Educational Technology Research and Development, 2025
The emergence of generative artificial intelligence (GenAI) has caused significant disruptions on a global scale in various workplace settings, including the field of instructional design (ID). Given the paucity of research investigating the impact of GenAI on ID work, we conducted a mixed methods study to understand instructional designers (IDs)'…
Descriptors: Artificial Intelligence, Familiarity, Instructional Design, Brainstorming
Peer reviewed Peer reviewed
Direct linkDirect link
Ruixun Dai; Matthew Krehl Edward Thomas; Shaun Rawolle – British Journal of Sociology of Education, 2025
This article applies Foucault's theories of surveillance, disciplinary power, and normalisation to examine the shifting power dynamics in AI-mediated education. Drawing on qualitative responses from 27 English and Chinese-speaking stakeholders, including students, teachers, administrators and parents with no geographical restrictions, this study…
Descriptors: Educational Philosophy, Power Structure, Artificial Intelligence, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Chrispus Zacharia Oroni; Fu Xianping; Daniela Daniel Ndunguru; Arsenyan Ani – Education and Information Technologies, 2025
In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety…
Descriptors: Educational Technology, Electronic Learning, Information Security, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Karlo Ložnjak; Anamaria Maleševic; Marin Cargo; Anamarija Mladinic; Zvonimir Koporc; Livia Puljak – Journal of Academic Ethics, 2024
Personal data protection is an ethical issue. In this study we analyzed how research ethics committees (RECs) and data protection officers (DPOs) handle personal data protection issues in research protocols. We conducted a mixed-methods study. We included heads (or delegated representatives) of RECs and DPOs from universities and public research…
Descriptors: Research Committees, Ethics, Information Security, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Thulasi M. Santhi; K. Srinivasan – IEEE Transactions on Learning Technologies, 2024
Cloud adoption in industrial sectors, such as process, manufacturing, health care, and finance, is steadily rising, but as it grows, the risk of targeted cyberattacks has increased. Hence, effectively defending against such attacks necessitates skilled cybersecurity professionals. Traditional human-based cyber-physical education is resource…
Descriptors: Artificial Intelligence, Information Security, Computer Security, Prevention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2023
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are "general purpose" units (i.e., municipalities, counties, towns and townships).…
Descriptors: Information Security, Computer Security, Local Government, Public Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Levis Omusugu Amuya; Peterson Mwai Kariuki – Journal of Higher Education Policy and Management, 2024
Academic institutions today are experiencing a legion of security risks that are increasingly impeding their mission of producing high-quality graduates, guarding reason and educational integrity, and ultimately advancing human civilisation. The Enterprise Security Risk Management (ESRM) model represents a potential solution to the dynamic threats…
Descriptors: Foreign Countries, Universities, Risk Management, Accreditation (Institutions)
Peer reviewed Peer reviewed
Direct linkDirect link
Zeinab Mohammed; Fatma Abdelgawad; Mamoun Ahram; Maha E. Ibrahim; Alya Elgamri; Ehsan Gamel; Latifa Adarmouch; Karima El Rhazi; Samar Abd ElHafeez; Henry Silverman – Research Ethics, 2024
Members of research ethics committees (RECs) face a number of ethical challenges when reviewing genomic research. These include issues regarding the content and type of consent, the return of individual research results, mechanisms of sharing specimens and health data, and appropriate community engagement efforts. This article presents the…
Descriptors: Research, Ethics, Committees, Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua M. Rosenberg; Conrad Borchers; Sondra M. Stegenga; Macy A. Burchfield; Daniel Anderson; Christian Fischer – Learning, Media and Technology, 2024
Schools and school districts use social media for a variety of reasons, but alongside the benefits of schools' social media use come potential risks to students' privacy. Using a novel dataset of around 18 million Facebook posts by schools and districts in the United States, we explore the extent to which personally identifiable information of…
Descriptors: Social Media, Elementary Schools, Secondary Schools, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Monica Tatasciore; Luke Strickland; Shayne Loft – Cognitive Research: Principles and Implications, 2024
Increased automation transparency can improve the accuracy of automation use but can lead to increased bias towards agreeing with advice. Information about the automation's confidence in its advice may also increase the predictability of automation errors. We examined the effects of providing automation transparency, automation confidence…
Descriptors: Automation, Access to Information, Information Technology, Bias
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  34