NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Policymakers1
What Works Clearinghouse Rating
Showing 1 to 15 of 47 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Juliana Elisa Raffaghelli; Marc Romero Carbonell; Teresa Romeu-Fontanillas – Information and Learning Sciences, 2024
Purpose: It has been demonstrated that AI-powered, data-driven tools' usage is not universal, but deeply linked to socio-cultural contexts. The purpose of this paper is to display the need of adopting situated lenses, relating to specific personal and professional learning about data protection and privacy. Design/methodology/approach: The authors…
Descriptors: Artificial Intelligence, Data Collection, Information Literacy, Intervention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frank Stinar; Zihan Xiong; Nigel Bosch – Journal of Educational Data Mining, 2024
Educational data mining has allowed for large improvements in educational outcomes and understanding of educational processes. However, there remains a constant tension between educational data mining advances and protecting student privacy while using educational datasets. Publicly available datasets have facilitated numerous research projects…
Descriptors: Foreign Countries, College Students, Secondary School Students, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Leo Van Audenhove; Lotte Vermeire; Wendy Van den Broeck; Andy Demeulenaere – Information and Learning Sciences, 2024
Purpose: The purpose of this paper is to analyse data literacy in the new Digital Competence Framework for Citizens (DigComp 2.2). Mid-2022 the Joint Research Centre of the European Commission published a new version of the DigComp (EC, 2022). This new version focusses more on the datafication of society and emerging technologies, such as…
Descriptors: Data Analysis, Data Collection, Information Literacy, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
David B. Warner; Lisa McKee – Journal of Cybersecurity Education, Research and Practice, 2024
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity…
Descriptors: Information Security, Privacy, Governance, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Yun Du – International Journal of Web-Based Learning and Teaching Technologies, 2024
This paper deeply discusses the transformation potential of integrating Internet big data into the pre-school education model in colleges and universities. Through in-depth analysis, we studied the challenges and opportunities faced by preschool education in colleges and universities, and discussed the innovative influence of big data technology…
Descriptors: Educational Innovation, Preschool Education, Data Analysis, Data Collection
Christian Beighton – Sage Research Methods Cases, 2021
This case discusses how scenario-based interviews can be used to develop research into policy and practice. Based on data collected from U.K. further education management settings, it shows how and why scenario-based interviews were used. It also explains how the data collected were then used to illustrate and analyze the implementation of a…
Descriptors: Foreign Countries, Interviews, Vignettes, Policy Formation
Peer reviewed Peer reviewed
Direct linkDirect link
Duncan Culbreth; Rebekah Davis; Cigdem Meral; Florence Martin; Weichao Wang; Sejal Foxx – TechTrends: Linking Research and Practice to Improve Learning, 2025
Monitoring applications (MAs) use digital and online tools to collect and track data on student behavior, and they have become increasingly popular among schools. Empirical research on these complex surveillance platforms is scant, and little is known about the efficacy or impact that they have on students. This study used a multi-method…
Descriptors: High School Students, COVID-19, Pandemics, Progress Monitoring
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Gilman Ranogajec, Mirna; Badurina, Boris – Education for Information, 2021
In today's Information society it is an everyday scenario to be a part of an online community such as social media. Participation has become almost mandatory to the point of acting as a virtual extremity to one's physical environment. This virtual extremity is the individual's window to the outside world and vice versa. The process of being a part…
Descriptors: Confidence Testing, Social Media, Information Security, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Patel, Pooja; Sarno, Dawn M.; Lewis, Joanna E.; Shoss, Mindy; Neider, Mark B.; Bohil, Corey J. – Applied Cognitive Psychology, 2019
Understanding how computer users allocate attention to features of potentially dangerous emails could help mitigate costly errors. Which features are salient? How stable is attention allocation across variation in email features? We attempted to measure the mental salience of several email features common in spam and/or phishing emails. We created…
Descriptors: Deception, Electronic Mail, Information Security, Data Collection
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4