Publication Date
In 2025 | 3 |
Since 2024 | 9 |
Since 2021 (last 5 years) | 14 |
Since 2016 (last 10 years) | 17 |
Since 2006 (last 20 years) | 28 |
Descriptor
Source
Author
Adil Jeghal | 1 |
Ali Yahyaouy | 1 |
Alkaabi, Shamma | 1 |
Alleyne, Philmore | 1 |
Ayfer Beylik | 1 |
Baris Yigit | 1 |
Basil Hanafi | 1 |
Bhunia, Swarup | 1 |
Brandi Robinson | 1 |
Burnam, Bruce | 1 |
Chaimae Tnibar-Harrus | 1 |
More ▼ |
Publication Type
Reports - Research | 29 |
Journal Articles | 26 |
Speeches/Meeting Papers | 2 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 16 |
Postsecondary Education | 13 |
Elementary Education | 7 |
Secondary Education | 6 |
Elementary Secondary Education | 3 |
High Schools | 3 |
Early Childhood Education | 1 |
Audience
Administrators | 2 |
Policymakers | 1 |
Practitioners | 1 |
Teachers | 1 |
Location
Turkey | 5 |
Canada | 3 |
Australia | 2 |
Asia | 1 |
China | 1 |
Denmark | 1 |
Florida | 1 |
Malaysia | 1 |
Morocco | 1 |
New Zealand | 1 |
North America | 1 |
More ▼ |
Laws, Policies, & Programs
Equal Access | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Chaimae Tnibar-Harrus; María José Latorre-Medina – Excellence in Education Journal, 2025
The purpose of this study was to analyze digital competencies of student teachers in Early Childhood Education and Primary Education of the Faculty of Education, Economy and Technology of Ceuta of the University of Granada. Specifically, we investigated the degree of competence in digital ethics that future teachers acquire, develop and/or enhance…
Descriptors: Ethics, Technological Literacy, Early Childhood Teachers, Elementary School Teachers
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Esra Pinar Uça Günes; Nuray Gedik; Mehmet Ali Isikoglu; Baris Yigit; Ihsan Günes; Ayfer Beylik – Open Praxis, 2024
The primary objective of this manuscript is to examine the online assessment and exam security procedures during the pandemic, with a particular focus on higher education. In this context, the study investigates the measures employed by instructors, the challenges they encountered, and the strategies they employed to overcome these challenges in a…
Descriptors: Tests, Distance Education, Supervision, COVID-19
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Hamisi Mfaume; Margareth Bilinga – Journal of Learning for Development, 2024
The invention of digital ICT devices is one of the most important developments in the history of humankind, and education can greatly benefit from it. However, cyber ethics violations by teachers have become prevalent and are expected to increase unless measures are taken. This study explored education stakeholders' perspectives on ways to promote…
Descriptors: Foreign Countries, Secondary School Teachers, Stakeholders, Computer Security
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
Pangrazio, Luci; Selwyn, Neil – Pedagogy, Culture and Society, 2021
The ongoing 'datafication' of contemporary society has a number of implications for schools and schooling. One is the increasing calls for schools to help develop young people's understandings about the role that digital data now plays in their everyday lives -- especially in terms of the 'data economy' and 'surveillance capitalism'. Reporting on…
Descriptors: Data Collection, Data Analysis, Technology Uses in Education, Data Processing
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Sharma, Vipin K.; Holbah, Wael A. – Arab World English Journal, 2022
The study investigates teachers' perceptions of the use of online language assessment (OLA) using technology and examines the scope of using online applications to validate the mode of assessment. It looks for EFL teachers' opinions of OLA to comprehend the many worries associated with the issues and improve the online assessment tools. The…
Descriptors: Language Teachers, Teacher Attitudes, English (Second Language), Second Language Learning
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Alleyne, Philmore; Soleyn, Sherlexis; Harris, Terry – Journal of Academic Ethics, 2015
The purpose of this study is to investigate the salient factors that influence accounting students to engage in software and music piracy. This study uses the theory of reasoned action (TRA) and the theory of planned behavior (TPB), and extends these models to incorporate other variables (such as moral obligation and perceived prosecution risk) to…
Descriptors: Predictor Variables, College Students, Accounting, Intention
Previous Page | Next Page »
Pages: 1 | 2