NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Emilio J. Del Riego – ProQuest LLC, 2024
This qualitative descriptive research study was conducted to explore the impact that transformational leadership and innovation have in creating a cybersecurity conscious organizational culture. The value of having a cybersecurity conscious organizational culture through transformational leadership and innovation is described in line with higher…
Descriptors: Transformational Leadership, Information Security, Computer Security, Organizational Culture
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Haseski, Halil Ibrahim – International Journal of Research in Education and Science, 2020
The present study aimed to determine the effect of individual cyber security skills of pre-service teachers on their attitudes towards computer-assisted education. Thus, the present research was designed as a correlational study. The study participants included 241 senior pre-service teachers in different departments at Manisa Celal Bayar…
Descriptors: Computer Security, Computer Literacy, Preservice Teachers, Computer Assisted Instruction
Reddy, Dinesh Sampangirama – ProQuest LLC, 2017
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Descriptors: Computer Security, Information Security, Information Technology, Self Efficacy
Brooks, D. Christopher; Pomerantz, Jeffrey – EDUCAUSE, 2017
For the fourteenth year, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology and higher education's most important end users, undergraduate students. For the 2017 report, 43,559 students from 124 institutions in 10 countries and 40 U.S. states participated in the research. The quantitative findings…
Descriptors: Undergraduate Students, Information Technology, Technology Uses in Education, Use Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Coggins, Porter E. – Computers in the Schools, 2013
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Descriptors: Computer Security, Elementary School Students, Student Attitudes, Computer Attitudes
Bosley, Sara – Adults Learning, 2011
Everyone knows that lack of internet access can reinforce the social and economic disadvantages already facing some older people. Recognising the divisive nature of digital exclusion, the government has invested 2.8 million British Pounds in Get Digital, a project that will enable sheltered housing residents to develop computer and internet…
Descriptors: Focus Groups, Computers, Housing, Educational Technology
Goldsborough, Reid – Black Issues in Higher Education, 2004
"Cookies" are tiny Web browser helpers and are an example of how the useful can get tossed in with the dangerous through the near hysteria brought about by the real threats of computer viruses, hacking, spyware, spam and phishing. This article briefly discusses antispyware legislation by Congress and the pros and cons of past and future…
Descriptors: Computer Security, Computers, Fear, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2007
According to a January 2007 survey by the Pew Internet & American Life Project, 55 percent of teens (ages 12 to 17) report having created a personal profile online, and an equal number regularly use social networking sites such as MySpace or Facebook. Of those, 91 percent use the sites to stay in touch with friends they see frequently. With all…
Descriptors: Internet, Social Networks, Adolescents, Student Motivation
Peer reviewed Peer reviewed
Gattiker, Urs E.; Perlusz, Stefano; Bohmann, Kristoffer – Internet Research, 2000
Illustrates some of the challenges that electronic commerce practitioners and researchers face, focusing on business to business (B2B) transactions. Highlights include a conceptual framework of Web user behavior; purchasing context; socio-demographic characteristics; cultural factors; economic factors; attitudes toward information technology;…
Descriptors: Computer Attitudes, Computer Security, Cultural Influences, Demography
Direct Marketing Association, Washington, DC. – 1997
The ability to meet people, visit places around the globe, and make purchases online has added a new dimension to teaching children about the opportunities and accompanying risks that exist in everyday life. The Direct Marketing Association has created this guide to information use, behavior, and privacy on the Internet to help parents supervise…
Descriptors: Computer Attitudes, Computer Security, Electronic Mail, Information Industry
Choy, Sarojni; McNickle, Cathy; Clayton, Berwyn – 2001
Since little research existed about services for online learners in Australia, a national study was conducted to explore the expectations and experiences of online learners in the Vocational Education and Training (VET) sector. Online learners enrolled with various Registered Training Organizations (RTOs) from the VET sector were contacted for…
Descriptors: Computer Attitudes, Computer Security, Computer Uses in Education, Course Content
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2004
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
Descriptors: Small Colleges, Computers, Student Surveys, Interaction
Previous Page | Next Page »
Pages: 1  |  2