Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 13 |
Descriptor
Information Security | 13 |
Information Technology | 13 |
College Students | 4 |
Computer Software | 4 |
Foreign Countries | 4 |
Privacy | 4 |
Computer Security | 3 |
Ethics | 3 |
Surveys | 3 |
Teaching Methods | 3 |
Business | 2 |
More ▼ |
Source
Author
Publication Type
Tests/Questionnaires | 13 |
Journal Articles | 12 |
Reports - Research | 9 |
Reports - Descriptive | 2 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Reports - General | 1 |
Audience
Media Staff | 1 |
Researchers | 1 |
Location
Australia | 1 |
Belgium | 1 |
Bermuda | 1 |
Canada | 1 |
Chile | 1 |
Czech Republic | 1 |
Denmark | 1 |
Finland | 1 |
France | 1 |
Germany | 1 |
Hungary | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Hassan Mallam Ibrahim; Kamsuriah Ahmad; Hasimi Sallehudin – Education and Information Technologies, 2025
As the need for digital content increases almost daily, preserving this content for university libraries, especially in the least developed and developing nations, becomes a challenge, resulting in the loss of this data. Even though most of these libraries are automated and adopt one digital preservation strategy or the other, library users need…
Descriptors: Preservation, Technology Uses in Education, Research Libraries, Internet
Okike, Benedict O. I.; Adetoro, 'Niran – Education and Information Technologies, 2019
Advances in Information and Communication Technology have significantly affected the way information is acquired, processed, stored, retrieved, communicated as well as secured. This has changed the way Librarians handle and secure information systems while users are expected to have some level of information and communication technology skills to…
Descriptors: Foreign Countries, Users (Information), Information Technology, Information Systems
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development
Labrecque, Lauren I.; Markos, Ereni; Darmody, Aron – Journal of Marketing Education, 2021
Sophisticated technology advances are delivering new and powerful ways for marketers to collect and use consumer data. These data-driven marketing capabilities present a unique challenge for students, as they will soon be expected to manage consumer data and make business decisions based on ethical, legal, and fiscal considerations. This article…
Descriptors: Marketing, Advertising, Privacy, Comparative Analysis
Pomykalski, James J. – Information Systems Education Journal, 2017
Many IS courses address the issues of ethical decision making and privacy through full course or section of a larger course. In this paper, the author discusses the development of a series of activities in an IS2010.07 course. The primary purpose of these activities is to raise awareness by the students of issues dealing with the collection,…
Descriptors: Privacy, Ethics, Information Science, Social Responsibility
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Schirf, Evan; Serapiglia, Anthony – Information Systems Education Journal, 2017
Every year several survey inventories are performed throughout the IT industry by trade magazines and research groups that attempt to gauge the current state of the industry as it relates to trends. Many of these highlight a technology skills gap between job expectations and potential employees. While many job openings exist and educational…
Descriptors: Intellectual Disciplines, Information Technology, Interviews, Administrators
Iqbal, Sarfraz – Journal of Information Systems Education, 2016
Information security (InfoSec) education becomes increasingly important. Building hands-on capabilities to tackle challenges is a precondition to mitigate and eliminate cyber threats. Existing studies, however, show that the field lacks pedagogically founded information security laboratories that can be used flexibly to educate both on-campus and…
Descriptors: Information Security, Electronic Learning, Online Courses, Action Research
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Naydenova, Iva; White, Bruce – Information Systems Education Journal, 2013
Healthcare has become a rapidly changing field. With the introduction of value-based purchasing to determine reimbursement of Medicare providers based on the quality of care in addition to outcomes in treatment, the environment is becoming ever more competitive. Saint Philip's Hospital is among the largest non-profit hospitals in the nation…
Descriptors: Hospitals, Health Services, Automation, Information Technology
OECD Publishing, 2014
The Programme for International Assessment of Adult Competencies (PIAAC) will establish technical standards and guidelines to ensure that the survey design and implementation processes of PIAAC yield high-quality and internationally comparable data. This document provides a revised version of the technical standards and guidelines originally…
Descriptors: Adults, International Assessment, Adult Literacy, Competence