NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 125 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Francisco D. Guillén-Gámez; Inmaculada Martínez-García; Enrique Alastor; Lukasz Tomczyk – Computers in the Schools, 2024
The authors have developed a psychometric instrument with the purpose of assessing the digital competencies of teachers in aspects of cybersecurity. From the collection of data, different secondary objectives were carried out: (1) identify if there were significant differences regarding gender; (2) understand if there are significant differences…
Descriptors: Preservice Teachers, Technological Literacy, Internet, Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zorlu, Eyup – Journal of Learning and Teaching in Digital Age, 2023
The purpose of this study is to examine the relationship between college students' cyberbullying awareness and their ability to ensure their personal cybersecurity. A total of 401 students participated in this study. The Ability to Ensure Personal Cybersecurity Scale, the Cyberbullying Awareness Scale, and a Personal Information Form developed by…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Subasi, Sibel; Korkmaz, Özgen; Çakir, Recep – International Journal of Technology in Education and Science, 2023
The aim of this study is to examine the digital footprint awareness of students while surfing on cyberbullying, cyber security and social networks with demographic data such as class, school, gender, internet usage level. This research was carried out using a descriptive survey model. The study group of the research consisted of 467 volunteer…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Secondary School Students
Michael L. Schliep – ProQuest LLC, 2021
Communication privacy is constantly under threat from Nation State Adversaries (NSA). This has led many platforms, such as Facebook and Apple, to implement secure conversation cryptographic protocols in their messaging applications. However, many of the protocols do not provide provable security and do not provide other security guarantees about…
Descriptors: Privacy, Interpersonal Communication, Computer Mediated Communication, Social Media
Peer reviewed Peer reviewed
Direct linkDirect link
William Belzak; J. R. Lockwood; Yigal Attali – Educational Measurement: Issues and Practice, 2024
Remote proctoring, or monitoring test takers through internet-based, video-recording software, has become critical for maintaining test security on high-stakes assessments. The main role of remote proctors is to make judgments about test takers' behaviors and decide whether these behaviors constitute rule violations. Variability in proctor…
Descriptors: Computer Security, High Stakes Tests, English (Second Language), Second Language Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Raju, Rajeswari; Abd Rahman, Nur Hidayah; Ahmad, Atif – Asian Journal of University Education, 2022
As COVID-19 took hold, online learning became the norm as universities and classrooms worldwide were forced to close their doors. Education institute closures impacted more than 1.2 billion students across 186 countries as of April 2020. This pandemic, too, has shifted our Malaysian education sector as well. Academicians and students are adopting…
Descriptors: Foreign Countries, Computer Security, Knowledge Level, College Students
Brown, Lynn – ProQuest LLC, 2023
Students need academic tools and digital skills for proper social interactions in a digital society. Researchers Ribble and Park (2019) designed the S3 Framework which stresses the importance of developing safe, savvy, and social digital citizens. Using this framework, a series of interventions were developed for students and staff to increase the…
Descriptors: Computer Security, Information Security, Safety, Citizenship
Peer reviewed Peer reviewed
Direct linkDirect link
Israel Mbekezeli Dabengwa; Sibonile Moyo; Smart Ncube; Tinashe Byron Gashirai; Daga Makaza; Paul Makoni; Notice Pasipamire; Goodwill Kudakwashe Chademana; Mufudzi Mafoti; Stonard Mapfumo; Dzikamayi Mandaza – Cogent Education, 2024
This paper presents a study that investigates digital competencies within the Zimbabwean secondary education system. Limited research has focused on Zimbabwe's secondary schoolteachers' digital literacy in online learning. The study utilised DigComp 2.2 as the framework, and employed a multi-method participative approach to collect data from…
Descriptors: Foreign Countries, Technological Literacy, Secondary School Teachers, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Lisa M. Jones; Kimberly J. Mitchell; Cheryl L. Beseler – Contemporary School Psychology, 2024
School psychologists and other school professionals are increasingly turning to digital citizenship programs to improve children's online safety. However, to date, there has been no rigorous outcome evaluation of these programs. The current study used a cluster randomized control trial methodology (CRCT) to evaluate the impact of the Be Internet…
Descriptors: Elementary School Students, Computer Security, Bullying, Computer Mediated Communication
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Hans Kaushik; Smriti Kaushik – Education and Information Technologies, 2024
The involvement of technology in the education domain has transformed the traditional system in many countries. The need was realized when 300 million students in India itself were pushed to move from traditional to various digital education platforms during the pandemic. There has been an essential emphasis given to the promotion of digital based…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tessa Consoli – Frontline Learning Research, 2024
Based on a national survey of 8,915 students, this study examines the prevalence of different types of media education practices in Swiss upper secondary schools and their relationship with students' online civic engagement and respectful online behavior. Descriptive statistics reveal that schools place little emphasis on media education and that…
Descriptors: Media Education, Teaching Methods, Differences, Citizen Participation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Michael Adorjan; Rosemary Ricciardelli; Mohana Mukherjee – British Journal of Educational Studies, 2024
Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative…
Descriptors: Computer Security, Restorative Practices, Bullying, Computer Mediated Communication
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9