NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Kwun Hung Li; Dickson K.W. Chiu; Elaine W.S. Kong; Kevin K.W. Ho – Education & Training, 2025
Purpose: This research investigates mobile security awareness among university students in Hong Kong, who increasingly rely on mobile devices for their daily activities and academic needs. This research seeks to inform targeted educational strategies and policies to enhance mobile security practices among young adults, particularly in regions…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Virginia Clinton-Lisell; Alison E. Kelly – International Journal of Technology in Education and Science, 2024
The use of online homework systems that require the purchase of an access code has become widespread. The purpose of this study is to examine student experiences with and perceptions of online homework systems with access codes. Postsecondary students (N = 966) completed a survey about the financial costs, perceptions of quality, engagement with,…
Descriptors: Homework, Educational Technology, Technology Uses in Education, Student Experience
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; McCoey, Margaret – International Journal of Information and Communication Technology Education, 2016
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
Descriptors: Ethics, Information Security, Curriculum, Experiential Learning
Peña, Christina – Workforce Data Quality Campaign, 2018
Employers are demanding higher skilled and better educated workers. Yet employer sentiment and the high default rate on student loans suggests a mismatch between the programs students are completing and the work they are able to find. To report on trends in postsecondary education, the U.S. Department of Education (ED) mostly relies on surveys of…
Descriptors: Employment Qualifications, Job Skills, Program Effectiveness, Postsecondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses