NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 202520
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Mahao Mahao; Julia Chere-Masopha – Discourse and Communication for Sustainable Education, 2025
Digital literacy has become crucial for functionality and productivity in academics, work, and everyday community lives. However, easy access to digital technologies, accompanied by limited digital literacy, can expose users to the dangers that lurk in the digital world. Young people, who are frequent users of these technologies yet have less…
Descriptors: Student Teachers, Student Attitudes, Computer Security, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Marian Horváth; Marek Hlásny; Slávka Krásna – Acta Educationis Generalis, 2025
Introduction: The digital era is reshaping not only technology and economy but also the legal systems governing democratic societies. The rapid emergence of artificial intelligence, big data, and digitisation calls for proactive adaptation of legal frameworks. This article explores the intersection of digital transformation and the rule of law,…
Descriptors: Democracy, Laws, Artificial Intelligence, Governance
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Jenay Robert – EDUCAUSE, 2025
In the "2024 EDUCAUSE Horizon Report: Cybersecurity and Privacy Edition," a panel of experts agreed that a key practice for advancing the future of higher education cybersecurity and privacy is supporting agency, trust, transparency, and involvement among stakeholders. In fact, these are such important topics for the higher education…
Descriptors: Higher Education, Futures (of Society), Educational Trends, Trust (Psychology)
Peer reviewed Peer reviewed
Direct linkDirect link
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Peer reviewed Peer reviewed
Direct linkDirect link
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Chaimae Tnibar-Harrus; María José Latorre-Medina – Excellence in Education Journal, 2025
The purpose of this study was to analyze digital competencies of student teachers in Early Childhood Education and Primary Education of the Faculty of Education, Economy and Technology of Ceuta of the University of Granada. Specifically, we investigated the degree of competence in digital ethics that future teachers acquire, develop and/or enhance…
Descriptors: Ethics, Technological Literacy, Early Childhood Teachers, Elementary School Teachers
Desmond Rudd; Zac Chase, Contributor; Michael Klein, Contributor – Office of Educational Technology, US Department of Education, 2025
This is the fourth in a series of five briefs published by Office of Education Technology (OET) on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations outlined in the 2017 OET…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Rural Areas
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Leonardo Gallego Joya; Martha Andrea Merchán Merchán; Ellie Anne López Barrera – Contemporary Educational Technology, 2025
The systematic review permitted the characterization of training programs in digital teaching competence using an analysis of their structure, implementation, and results. A comprehensive search was conducted across five databases, namely Scopus, Web of Science, Redalyc, Science Direct, and LENS, to retrieve scientific articles published between…
Descriptors: Teacher Competencies, Technological Literacy, Teacher Motivation, Teacher Education Programs
Previous Page | Next Page »
Pages: 1  |  2