Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Differences | 4 |
Internet | 3 |
Audits (Verification) | 2 |
Computer Networks | 2 |
Content Analysis | 2 |
Foreign Countries | 2 |
Information Security | 2 |
Privacy | 2 |
Barriers | 1 |
Citizen Participation | 1 |
More ▼ |
Source
Delta Pi Epsilon Journal | 1 |
Frontline Learning Research | 1 |
Interdisciplinary Journal of… | 1 |
Journal of Education for… | 1 |
Author
Zhao, Jensen J. | 2 |
Alexander, Melody W. | 1 |
Boutnaru, Shlomi | 1 |
Hershkovitz, Arnon | 1 |
Tessa Consoli | 1 |
Truell, Allen D. | 1 |
Woosley, Sherry A. | 1 |
Zhao, Sherry Y. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Tests/Questionnaires | 1 |
Education Level
Secondary Education | 2 |
Grade 11 | 1 |
Grade 12 | 1 |
High Schools | 1 |
Audience
Location
Israel | 1 |
Switzerland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tessa Consoli – Frontline Learning Research, 2024
Based on a national survey of 8,915 students, this study examines the prevalence of different types of media education practices in Swiss upper secondary schools and their relationship with students' online civic engagement and respectful online behavior. Descriptive statistics reveal that schools place little emphasis on media education and that…
Descriptors: Media Education, Teaching Methods, Differences, Citizen Participation
Boutnaru, Shlomi; Hershkovitz, Arnon – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2015
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…
Descriptors: Computer Software, Computer Security, Programming Languages, Computer Science Education
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet