NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Research15
Journal Articles14
Tests/Questionnaires4
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 15 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Feye, K. M.; Lekkala, H.; Lee-Bartlett, J. A.; Thompson, D. R.; Ricke, S. C. – Journal of Food Science Education, 2020
Automation is coming and will enable not only the ability to increase poultry processing line speeds, but also the collection of considerable "big data." These data can be collected "en masse," stored, analyzed, and used to improve food safety, quality, enhance traceability, and also be used for risk assessment. However, as…
Descriptors: College Students, Food, Safety, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Haseski, Halil Ibrahim – International Journal of Research in Education and Science, 2020
The present study aimed to determine the effect of individual cyber security skills of pre-service teachers on their attitudes towards computer-assisted education. Thus, the present research was designed as a correlational study. The study participants included 241 senior pre-service teachers in different departments at Manisa Celal Bayar…
Descriptors: Computer Security, Computer Literacy, Preservice Teachers, Computer Assisted Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Al-araibi, Asma Ali Mosa; Naz'ri bin Mahrin, Mohd; Yusoff, Rasimah Che Mohd; Chuprat, Suriayati Binti – Education and Information Technologies, 2019
The rate of adoption of e-learning has increased significantly in most higher education institutions in the world. E-learning refers to the use of electronic media, educational technology, also; information and communication technology (ICT) in the educational process. The aim for adopting e-learning is to provide students with educational…
Descriptors: Electronic Learning, Learning Readiness, Educational Technology, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ivy, Jessica; Kelley, Robert; Cook, Kristin; Thomas, Kevin – International Journal of Computer Science Education in Schools, 2020
Although many practicing teachers have not experienced teacher preparation programs that teach cyber security (Pusely & Sadera, 2011) or are familiar with cyber principles (Authors), embedding these ideas into instruction in a variety of content areas is essential for promoting cyber literacy and citizenship. This study explores a professional…
Descriptors: Secondary School Curriculum, High School Teachers, Middle School Teachers, Faculty Development
Peer reviewed Peer reviewed
Direct linkDirect link
Noguerón-Liu, Silvia – Journal of Adolescent & Adult Literacy, 2017
This article examines immigrant adults' understandings of privacy, risk, and vulnerability in digital literacy practices that involve visual media. Although the benefits of digital media production have been explored with immigrant youths, the perspectives of adults remain unexplored. Informed by critical and transnational perspectives to digital…
Descriptors: Immigrants, Adults, Privacy, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Amo, Laura C.; Liao, Ruochen; Frank, Emma; Rao, H. Raghav; Upadhyaya, Shambhu – IEEE Transactions on Education, 2019
Contribution: Intervention effectiveness is shown to vary in its influence on teenagers' outcomes with cybersecurity problem-solving and engagement. In-depth, high-intensity types of intervention may be more effective for female students. Background: Instructional interventions are being developed to address both the critical shortage in…
Descriptors: Computer Security, Computer Literacy, Adolescents, Intervention
Peer reviewed Peer reviewed
Direct linkDirect link
Goertler, Senta; Gacs, Adam – Unterrichtspraxis/Teaching German, 2018
As online educational programs and courses increase (Allen & Seaman, [Allen, I. E., 2014]), it is important to understand the benefits and limitations of this delivery format when assessing students and when comparing learning outcomes. This article addresses the following two questions: (1) What are some of the best practices in assessing…
Descriptors: Online Courses, Second Language Instruction, Second Language Learning, German
Brooks, D. Christopher; Pomerantz, Jeffrey – EDUCAUSE, 2017
For the fourteenth year, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology and higher education's most important end users, undergraduate students. For the 2017 report, 43,559 students from 124 institutions in 10 countries and 40 U.S. states participated in the research. The quantitative findings…
Descriptors: Undergraduate Students, Information Technology, Technology Uses in Education, Use Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Coggins, Porter E. – Computers in the Schools, 2013
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Descriptors: Computer Security, Elementary School Students, Student Attitudes, Computer Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wu, Yejun – Journal of Education for Library and Information Science, 2013
This paper addresses the curriculum overlap and gap between LIS education and intelligence education by analyzing the content of the websites of the intelligence education programs and courses in 27 representative intelligence education universities in the United States, and the intelligence-related programs and courses in the 56 LIS programs in…
Descriptors: Library Science, Library Education, Web Sites, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Kafai, Yasmin B. – Journal of Science Education and Technology, 2008
Our work investigates the annual outbreak of Whypox, a virtual epidemic in Whyville.net, a virtual world with over 1.2 million registered players ages 8-16. We examined online and classroom participants' understanding of a computer virus using surveys and design activities. Our analyses reveal that students have a mostly naive understanding of a…
Descriptors: Instructional Design, Student Attitudes, Knowledge Level, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Norum, Pamela S.; Weagley, Robert O. – Journal of Educational Technology Systems, 2007
The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…
Descriptors: College Students, Risk, Multivariate Analysis, Internet