Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Software | 7 |
Risk Management | 7 |
Foreign Countries | 3 |
Models | 3 |
Barriers | 2 |
Business Administration… | 2 |
Computer Mediated… | 2 |
Education Work Relationship | 2 |
Higher Education | 2 |
Program Effectiveness | 2 |
Safety | 2 |
More ▼ |
Source
Australasian Journal of… | 1 |
Education 3-13 | 1 |
Higher Education, Skills and… | 1 |
Information Systems Education… | 1 |
Innovations in Education and… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Postsecondary… | 1 |
Author
Anand Prakash | 1 |
Celeste Atkins | 1 |
Cummings, Jeffrey | 1 |
Elizabeth Collins | 1 |
Eunjae Park | 1 |
Guzzomi, Andrew | 1 |
Hannah Soong | 1 |
Hassan, Ghulam Mubashar | 1 |
Janicki, Thomas | 1 |
Kenworthy, Patrick | 1 |
Khan, R. Nazim | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 7 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Elementary Education | 1 |
Grade 5 | 1 |
Intermediate Grades | 1 |
Middle Schools | 1 |
Audience
Location
Australia | 2 |
United Kingdom (Edinburgh) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Anand Prakash; Sudhir Ambekar – Higher Education, Skills and Work-based Learning, 2024
Purpose: This study aims to describe the fundamentals of teaching risk management in a classroom setting, with an emphasis on the learning interface between higher education and the workplace environment for business management students. Design/methodology/approach: The study reviews literature that uses spreadsheets to visualize and model risk…
Descriptors: Risk Management, Case Method (Teaching Technique), Teaching Methods, Higher Education
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
Michelle M. Neumann; Eunjae Park; Hannah Soong; Sue Nichols; Nadia Selim – Education 3-13, 2024
Social media apps are being increasingly used by primary school children and this has influenced how they connect and communicate with others. Child use of social media has raised societal concerns about its impact on early development. To gain a deeper understanding of children's experiences with social media, children in grade 5 (N = 28; girls:…
Descriptors: Social Media, Social Networks, Elementary School Students, Safety
Sarah Blanchard Kyte; Celeste Atkins; Elizabeth Collins; Regina Deil-Amen – Journal of Postsecondary Student Success, 2023
Universities are increasingly turning toward data-driven technologies like data dashboards to support advisors' work in student success, yet little empirical work has explored whether these tools help or hinder best practices in advising, which is in many ways a relationship-based enterprise. This mixed-methods study analyzed whether and why the…
Descriptors: Learning Analytics, Computer Software, School Holding Power, Academic Persistence
Yamnitsky, Eugene – Innovations in Education and Teaching International, 2023
The doctoral journey is a complex endeavour, and like any complex project, deserves to be managed accordingly. Agile Project Management has been used successfully by practitioners in the Software industry for the last two decades and recently is being adopted in other industries, including in Higher Education. Based on the author's personal…
Descriptors: Doctoral Programs, Computer Software, Industry, Higher Education
Valentine, Andrew; Van der Veen, Tom; Kenworthy, Patrick; Hassan, Ghulam Mubashar; Guzzomi, Andrew; Khan, R. Nazim; Male, Sally A. – Australasian Journal of Educational Technology, 2021
A barrier to using head mounted display (HMD) virtual reality (VR) in education is access to hardware for large classes. This paper compares students' learning when engaging with an HMD VR simulation as the operator and as the observer, to evaluate whether benefits of HMD VR can be achieved without requiring all students to operate the equipment.…
Descriptors: Educational Technology, Technology Uses in Education, Computer Simulation, Graduate Students
Janicki, Thomas; Cummings, Jeffrey – Information Systems Education Journal, 2022
As the skills and competencies needed by Information Systems (IS) undergraduates continues to grow, various IS professional societies have developed recommendations which are updated on a periodic basis. These recommendations known as 'model curricula' are a guide for faculty and institutions to consider when developing or evaluating the…
Descriptors: Information Science Education, Information Systems, Computer Software, Undergraduate Students