Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Networks | 8 |
Privacy | 8 |
Computer Security | 4 |
Information Security | 4 |
Computer Mediated… | 3 |
Foreign Countries | 3 |
Internet | 3 |
Social Media | 3 |
Telecommunications | 3 |
Access to Information | 2 |
Audits (Verification) | 2 |
More ▼ |
Source
Journal of Education for… | 2 |
Australasian Journal of… | 1 |
ED, Education at a Distance | 1 |
Educational Technology &… | 1 |
Interdisciplinary Journal of… | 1 |
Internet Research | 1 |
Journal of Cybersecurity… | 1 |
Author
Zhao, Sherry Y. | 2 |
Baldwin, George D. | 1 |
Bell, Kevin R. | 1 |
Claessens, Joris | 1 |
Diaz, Claudia | 1 |
Dumortier, Jos | 1 |
Goemans, Caroline | 1 |
Jinghua Zhang | 1 |
Jinsheng Xu | 1 |
Kelvin Bryant | 1 |
Kevin Hilliard | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 8 |
Tests/Questionnaires | 2 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Teachers | 1 |
Location
Australia | 1 |
Israel | 1 |
South Africa (Cape Town) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security

Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos – Internet Research, 2003
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Descriptors: Access to Computers, Computer Mediated Communication, Computer Networks, Information Networks
Baldwin, George D. – ED, Education at a Distance, 1994
Evaluates the use of computer-mediated communication in a sociology course at Henderson State University (Arkansas). Highlights include information literacy and liberal arts education; critical thinking; computer conferencing on campus networks; online teaching methods and evaluation; student characteristics; electronic mail; privacy and freedom…
Descriptors: Computer Mediated Communication, Computer Networks, Course Evaluation, Critical Thinking