Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Author
Bhatnagar, Neelima | 1 |
Brown, Victoria | 1 |
Gezer, Tuba | 1 |
Hwang, Jae-Won | 1 |
Jamie Reeves | 1 |
Jenay Robert | 1 |
Karst, Nathaniel | 1 |
Kathe Pelletier | 1 |
Kim, Rosemary | 1 |
Kim, Sang Soo | 1 |
Mark McCormack | 1 |
More ▼ |
Publication Type
Tests/Questionnaires | 11 |
Journal Articles | 9 |
Reports - Research | 9 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 7 |
Postsecondary Education | 6 |
Elementary Education | 2 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Karst, Nathaniel; Slegers, Rosa – PRIMUS, 2019
Many of the applied mathematics courses we teach touch upon a range of rich and important ethical issues -- issues that, for a number of reasons, are rarely openly discussed in class. In this work, we describe a sequence of activities co-designed and co-taught by philosophy and mathematics faculty in the hopes of bridging the divide between the…
Descriptors: Team Teaching, Ethics, Mathematics Instruction, Technology
Kim, Sang Soo – Interactive Learning Environments, 2023
As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary to explore the motivators and barriers to student engagement comprehensively. Given the nature of an online learning environment, this study specifically focused on security…
Descriptors: Online Courses, Universities, COVID-19, Pandemics
Martin, Florence; Gezer, Tuba; Wang, Wei Chao; Petty, Teresa; Wang, Chuang – Journal of Research on Technology in Education, 2022
Digital citizenship refers to exhibiting responsible digital habits to function in a digital world. The purpose of this mixed methods study is to examine K-12 educators' experiences based on a digital citizenship graduate-level course that they participated in for professional development. Forty-five educators participated in this course. In…
Descriptors: Elementary Secondary Education, Teaching Experience, Graduate Study, Faculty Development
Kathe Pelletier; Mark McCormack; Nicole Muscanell; Jamie Reeves; Jenay Robert; Nichole Arbino – EDUCAUSE, 2024
In the denouement of the COVID-19 pandemic, talk of a return to "normalcy" in higher education belies the great challenges and ongoing disruptions that yet lie ahead for many institutions. Public perceptions of the value of postsecondary education continue their downward slide, placing institutions in the position of having to…
Descriptors: Trend Analysis, Technology Uses in Education, Educational Technology, Artificial Intelligence
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Wespieser, Karen – National Foundation for Educational Research, 2015
This report looks at the online activities of London's young people. The report highlights that children and young people use technology to have fun, study and communicate with others. Most children and young people have positive experiences online. On the whole they are sensible online and do not put themselves "at risk". However, the…
Descriptors: Foreign Countries, Internet, Children, Youth
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security