NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 12 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ece Gumusel – Journal of Education for Library and Information Science, 2025
The rapid advancement of technology has presented marginalized communities in libraries with numerous privacy and security challenges. Many researchers have emphasized the importance of Privacy-Enhancing Technologies (PETs), suggesting that these technical solutions can effectively assist users in safeguarding their personally identifiable…
Descriptors: Privacy, LGBTQ People, College Students, Information Science Education
Serena Sullivan – ProQuest LLC, 2022
The complexity and frequency of online attacks have been steadily increasing; additional privacy protection and security measures are necessary for individuals to safeguard Personal Identifiable Information (PII). Challenges exist for Trinidad State College (TSC) students to improve online personal privacy protection behaviors. Protective…
Descriptors: Rural Schools, College Students, Privacy, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Virginia Clinton-Lisell; Alison E. Kelly – International Journal of Technology in Education and Science, 2024
The use of online homework systems that require the purchase of an access code has become widespread. The purpose of this study is to examine student experiences with and perceptions of online homework systems with access codes. Postsecondary students (N = 966) completed a survey about the financial costs, perceptions of quality, engagement with,…
Descriptors: Homework, Educational Technology, Technology Uses in Education, Student Experience
Emerick, Gerald John – ProQuest LLC, 2020
Despite the strong, global demand for talented workers, higher than average salaries, and relatively low education requirements (bachelor's degree) for computing fields such as cybersecurity, there continues to be a pipeline issue with graduating enough workers educated in cybersecurity to fill the demand in the United States and globally…
Descriptors: Computer Security, Information Security, Career Choice, Influences
Aljuaid, Alanoud – ProQuest LLC, 2022
There is a workforce shortage and a huge gender disparity in the cybersecurity profession globally and Saudi Arabia. Enabling women to access these opportunities involves bolstering training and implementing reforms to give women the go-ahead to access these opportunities. With only a paltry 5% of women being in cybersecurity in the Middle East…
Descriptors: Foreign Countries, Gender Differences, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Toperesu, B-Abee; Van Belle, Jean-Paul – International Association for Development of the Information Society, 2018
The field of mobile learning has received much attention in both the academic research fields and the practical fields. Yet the implementation rate is low with very few higher education institutions (HEIs) offering full support for this channel. The aim of this research is to evaluate the different mobile learning considerations as identified in…
Descriptors: Telecommunications, Handheld Devices, Educational Technology, Technology Uses in Education
Alghamdi, Osamah Mohammed – ProQuest LLC, 2018
Online learning has the potential to expand collaborative learning and teaching. It has tremendous potential in the educational field, as it allows people to access computing services to share and edit data over the Internet. Yet few studies investigate the growing impacts of online learning on students' learning skills, such as collaborative…
Descriptors: Foreign Countries, Online Courses, Educational Technology, Technology Uses in Education
Murphy, Colleen F. – ProQuest LLC, 2018
By 2020, the global need for information security professionals is expected to reach six million and the shortfall in meeting that need is expected to be over one and a half million. Not only is there a shortage of cybersecurity professionals but those who are graduates of a cybersecurity program are not adequately skilled to assume significant…
Descriptors: Instructional Design, Computer Security, Information Security, Labor Force Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Amigud, Alexander – International Review of Research in Open and Distance Learning, 2013
Physical separation of students and instructors creates the gap of anonymity and limited control over the remote learning environment. The ability of academic institutions to authenticate students and validate authorship of academic work at various points during a course is necessary for preserving not only perceived credibility but also public…
Descriptors: Foreign Countries, Distance Education, Higher Education, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wozencroft, Kelly; Campbell, Marilyn; Orel, Alexandria; Kimpton, Melanie; Leong, Eliza – Australian Journal of Educational & Developmental Psychology, 2015
Little is known about the prevalence of cyberbullying among university students and less about whether they utilise anti-bullying policies. However, failure to report cyberbullying incidents to authorities would lessen the efficacy of these policies. This study investigated the prevalence of cyberbullying among university students and their…
Descriptors: Bullying, Intention, Information Security, Incidence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
DeSantis, Nick – Chronicle of Higher Education, 2012
College campuses are hothouses of data, including course schedules, degree requirements, and grades. But much of the information remains spread out across software systems or locked on university servers. Start-up companies want to pry the information loose from campus servers in order to offer personalized services that could transform the…
Descriptors: Higher Education, Campuses, Grades (Scholastic), Scores