NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Research57
Journal Articles54
Tests/Questionnaires6
Speeches/Meeting Papers2
Audience
Teachers1
Laws, Policies, & Programs
G I Bill1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 57 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Mahao Mahao; Julia Chere-Masopha – Discourse and Communication for Sustainable Education, 2025
Digital literacy has become crucial for functionality and productivity in academics, work, and everyday community lives. However, easy access to digital technologies, accompanied by limited digital literacy, can expose users to the dangers that lurk in the digital world. Young people, who are frequent users of these technologies yet have less…
Descriptors: Student Teachers, Student Attitudes, Computer Security, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Peer reviewed Peer reviewed
Direct linkDirect link
Heinrich, Matthew; Gerhart, Natalie – Journal of Information Systems Education, 2023
Mobile devices are a constantly used item in a college student's life. Students depend on them for entertainment, academics, and socializing with their friends. While they continually use them, they perhaps do not understand the impact of their use on their privacy or that the devices can be used to track them and collect their personal…
Descriptors: Privacy, Handheld Devices, College Students, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pant, Harsh Vardhan; Lohani, Manoj Chandra; Pande, Jeetendra – Journal of Learning for Development, 2023
In recent years, sentiment analysis has gained popularity among researchers in various domains, including the education domain. Sentiment analysis can be applied to review the course comments in Massive Open Online Courses (MOOCs), which could enable course designers' to easily evaluate their courses. The objective of this study is to explore the…
Descriptors: MOOCs, Course Evaluation, Dropout Attitudes, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Hong, Wilson Cheong Hin; Chi, ChunYang; Liu, Jia; Zhang, YunFeng; Lei, Vivian Ngan-Lin; Xu, XiaoShu – Education and Information Technologies, 2023
A multitude of studies have suggested potential factors that influence internet security awareness (ISA). Some, for example, used GDP and nationality to explain different ISA levels in other countries but yielded inconsistent results. This study proposed an extended knowledge-attitude-behaviour (KAB) model, which postulates an influence of the…
Descriptors: Foreign Countries, College Students, College Graduates, Employment
Sisi Long; Ting Zhu; Xizi Chen – Digital Education Review, 2023
Problematic Internet use (PIU) can lead to dysfunction and undesired consequences, especially in adolescents and youths. Studies have shown that personal emotional characteristics and relationships with others are associated with PIU. We pursue the neglected question of whether there is a correlation between personal ability, such as new media…
Descriptors: Internet, Media Literacy, College Students, Gender Differences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Raju, Rajeswari; Abd Rahman, Nur Hidayah; Ahmad, Atif – Asian Journal of University Education, 2022
As COVID-19 took hold, online learning became the norm as universities and classrooms worldwide were forced to close their doors. Education institute closures impacted more than 1.2 billion students across 186 countries as of April 2020. This pandemic, too, has shifted our Malaysian education sector as well. Academicians and students are adopting…
Descriptors: Foreign Countries, Computer Security, Knowledge Level, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pinchot, Jamie; Cellante, Donna; Mishra, Sushma; Paullet, Karen – Information Systems Education Journal, 2020
The cybersecurity industry is facing a significant shortage of professionals to fill open positions, with a projected staffing shortage of 1.8 million jobs worldwide by 2022. Part of this shortage can be attributed to the underrepresentation of women in the field. This research addresses the gender gap in cybersecurity by exploring the perceptions…
Descriptors: Student Attitudes, Barriers, Mentors, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Tewari, Alok; Singh, Ram; Mathur, Smriti; Pande, Sushil – International Journal of Information and Learning Technology, 2023
Purpose: The current study employs a modified framework of the unified theory of acceptance and use of technology (UTAUT) to predict students' intention to adopt online learning in India. The moderating role of openness to change in influencing the proposed relationships is also assessed. Design/methodology/approach: A structured questionnaire was…
Descriptors: Intention, Educational Technology, Online Courses, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jamal, Bakht; Rizvi, Syed Asad Abbas – Pakistan Journal of Distance and Online Learning, 2023
This paper intended to analyze the practices of digital citizenship among university student in Pakistan. The quantitative descriptive survey research design was adopted for this study. The population of the study was 800 students of BS (Education) program in ten public sector universities in Punjab, Pakistan. Simple random sampling technique was…
Descriptors: Foreign Countries, Technological Literacy, College Students, Computer Use
Peer reviewed Peer reviewed
Direct linkDirect link
Feye, K. M.; Lekkala, H.; Lee-Bartlett, J. A.; Thompson, D. R.; Ricke, S. C. – Journal of Food Science Education, 2020
Automation is coming and will enable not only the ability to increase poultry processing line speeds, but also the collection of considerable "big data." These data can be collected "en masse," stored, analyzed, and used to improve food safety, quality, enhance traceability, and also be used for risk assessment. However, as…
Descriptors: College Students, Food, Safety, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Shaobin Chen; Qingrong Li; Tao Wang – International Journal of Information and Communication Technology Education, 2024
This study aims to assess the implementation of smart campus and the students' learning engagement at Zhongshan College, China. A well-structured questionnaire was developed, and information was collected from 277 students and 377 teachers. The results indicate that both groups of respondents highly agree on the construction levels of the smart…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Learner Engagement
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4