Publication Date
In 2025 | 1 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 12 |
Since 2016 (last 10 years) | 21 |
Since 2006 (last 20 years) | 29 |
Descriptor
College Students | 29 |
Computer Security | 29 |
Student Attitudes | 29 |
Foreign Countries | 13 |
Information Security | 12 |
Educational Technology | 8 |
Information Technology | 8 |
Technology Uses in Education | 8 |
Computer Science Education | 7 |
Handheld Devices | 7 |
Computer Software | 6 |
More ▼ |
Source
Author
Abdullah Al Fahad | 1 |
Abu Saleh Md. Sohel-Uz-Zaman | 1 |
Ahamed, Sheikh | 1 |
Ahmed Imran Kabir | 1 |
Alqarni, Amani | 1 |
Bulbul Ahamed | 1 |
Cellante, Donna | 1 |
Chin, Amita | 1 |
Cross, Bria | 1 |
David P. Bunde | 1 |
Davis, Martin H., Jr. | 1 |
More ▼ |
Publication Type
Journal Articles | 23 |
Reports - Research | 19 |
Collected Works - Proceedings | 3 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 3 |
Books | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 29 |
Postsecondary Education | 24 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Early Childhood Education | 1 |
Grade 1 | 1 |
High Schools | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Secondary Education | 1 |
Audience
Teachers | 2 |
Location
China | 3 |
India | 3 |
United States | 3 |
Germany | 2 |
Israel | 2 |
Italy | 2 |
Morocco | 2 |
Netherlands | 2 |
Ohio | 2 |
Philippines | 2 |
Portugal | 2 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mahao Mahao; Julia Chere-Masopha – Discourse and Communication for Sustainable Education, 2025
Digital literacy has become crucial for functionality and productivity in academics, work, and everyday community lives. However, easy access to digital technologies, accompanied by limited digital literacy, can expose users to the dangers that lurk in the digital world. Young people, who are frequent users of these technologies yet have less…
Descriptors: Student Teachers, Student Attitudes, Computer Security, Foreign Countries
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Heinrich, Matthew; Gerhart, Natalie – Journal of Information Systems Education, 2023
Mobile devices are a constantly used item in a college student's life. Students depend on them for entertainment, academics, and socializing with their friends. While they continually use them, they perhaps do not understand the impact of their use on their privacy or that the devices can be used to track them and collect their personal…
Descriptors: Privacy, Handheld Devices, College Students, Student Attitudes
Pant, Harsh Vardhan; Lohani, Manoj Chandra; Pande, Jeetendra – Journal of Learning for Development, 2023
In recent years, sentiment analysis has gained popularity among researchers in various domains, including the education domain. Sentiment analysis can be applied to review the course comments in Massive Open Online Courses (MOOCs), which could enable course designers' to easily evaluate their courses. The objective of this study is to explore the…
Descriptors: MOOCs, Course Evaluation, Dropout Attitudes, Student Attitudes
Pinchot, Jamie; Cellante, Donna; Mishra, Sushma; Paullet, Karen – Information Systems Education Journal, 2020
The cybersecurity industry is facing a significant shortage of professionals to fill open positions, with a projected staffing shortage of 1.8 million jobs worldwide by 2022. Part of this shortage can be attributed to the underrepresentation of women in the field. This research addresses the gender gap in cybersecurity by exploring the perceptions…
Descriptors: Student Attitudes, Barriers, Mentors, Computer Security
Tewari, Alok; Singh, Ram; Mathur, Smriti; Pande, Sushil – International Journal of Information and Learning Technology, 2023
Purpose: The current study employs a modified framework of the unified theory of acceptance and use of technology (UTAUT) to predict students' intention to adopt online learning in India. The moderating role of openness to change in influencing the proposed relationships is also assessed. Design/methodology/approach: A structured questionnaire was…
Descriptors: Intention, Educational Technology, Online Courses, Student Attitudes
Shaobin Chen; Qingrong Li; Tao Wang – International Journal of Information and Communication Technology Education, 2024
This study aims to assess the implementation of smart campus and the students' learning engagement at Zhongshan College, China. A well-structured questionnaire was developed, and information was collected from 277 students and 377 teachers. The results indicate that both groups of respondents highly agree on the construction levels of the smart…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Learner Engagement
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Peter Draus; Sushma Mishra; Kevin Slonka; Natalya Bromall – Information Systems Education Journal, 2024
There is a significant skill gap, with millions of cybersecurity jobs still needing to be fulfilled due to a lack of a trained workforce. Various academic programs are available that teach students in different aspects of cybersecurity. This paper investigates if the title of an IT program has any impact on the desirability of a program and if…
Descriptors: College Students, Information Technology, Information Security, Cybernetics
Bulbul Ahamed; Mohammad Rashed Hasan Polas; Ahmed Imran Kabir; Abu Saleh Md. Sohel-Uz-Zaman; Abdullah Al Fahad; Saima Chowdhury; Mrittika Rani Dey – SAGE Open, 2024
The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh. A sample of 430 university students from two public and three private universities provided the data in…
Descriptors: Student Empowerment, Information Security, Knowledge Level, College Students
Chin, Amita; Jones, Beth; Little, Philip – International Journal of Education and Development using Information and Communication Technology, 2021
This study on smartphone security behaviors and practices is a continuation of the work in Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive university were compared to results from a 2014 survey at the same institution. That study found that students continued to be lax in their mobile security practices.…
Descriptors: Telecommunications, Handheld Devices, Computer Security, Student Attitudes
Payne, Brian K.; Paredes, Tisha; Cross, Bria – Education, 2020
This qualitative study assesses students' perceptions about electronic portfolios. A survey including two open-ended questions focusing on what students learned and what they would recommend to others about electronic portfolios was administered to current enrolled students majoring in criminal justice, cybersecurity, or leadership. We analyzed…
Descriptors: Student Attitudes, Portfolios (Background Materials), Electronic Publishing, College Students
Emerick, Gerald John – ProQuest LLC, 2020
Despite the strong, global demand for talented workers, higher than average salaries, and relatively low education requirements (bachelor's degree) for computing fields such as cybersecurity, there continues to be a pipeline issue with graduating enough workers educated in cybersecurity to fill the demand in the United States and globally…
Descriptors: Computer Security, Information Security, Career Choice, Influences
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Kaikho Ashuni – Asian Journal of Distance Education, 2024
The digital age has opened up new and exciting opportunities for Open and Distance Learning (ODL) in universities. But, is going digital reinforcing the existing social inequalities? This qualitative research examines the three levels of digital divide and digital inequality among learners at India's National Open University, IGNOU. The findings…
Descriptors: Distance Education, Open Education, Open Universities, Social Justice
Previous Page | Next Page »
Pages: 1 | 2