Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Observation | 7 |
Internet | 4 |
Information Technology | 3 |
Comparative Analysis | 2 |
Data Collection | 2 |
Foreign Countries | 2 |
Information Security | 2 |
Peer Relationship | 2 |
Questionnaires | 2 |
Telecommunications | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
Africa Education Review | 1 |
Contemporary Issues in… | 1 |
Education | 1 |
Information Systems Education… | 1 |
Author
Barton, Irving Gary, Jr. | 1 |
Brooks, Rochelle | 1 |
Esen, Binnaz Kiran | 1 |
Korkmaz, Murat | 1 |
Pike, Ronald E. | 1 |
Pittman, Jason M. | 1 |
Ramorola, M. Z. | 1 |
San Nicolas-Rocca, Tonia | 1 |
Soghoian, Christopher | 1 |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Research | 3 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Grade 10 | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Grade 7 | 1 |
Grade 8 | 1 |
Grade 9 | 1 |
High Schools | 1 |
Junior High Schools | 1 |
More ▼ |
Audience
Location
South Africa | 1 |
Turkey | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Barton, Irving Gary, Jr. – ProQuest LLC, 2017
Military education is held to high standards for our servicemen and women. The purpose of this quantitative, comparative study was to determine if significant differences existed in learning styles relative to military experience as determined by learning in a serious game environment. Study results are expected to advance the state of research in…
Descriptors: Educational Games, Evaluation Methods, Military Training, Comparative Analysis
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Soghoian, Christopher – ProQuest LLC, 2012
Telecommunications carriers and service providers now play an essential role in facilitating modern surveillance by law enforcement agencies. The police merely select the individuals to be monitored, while the actual surveillance is performed by third parties: often the same email providers, search engines and telephone companies to whom consumers…
Descriptors: Telecommunications, Law Enforcement, Internet, Privacy
Korkmaz, Murat; Esen, Binnaz Kiran – Education, 2013
The aim of this study is to design and evaluate a peer-training program about changing students' internet use habits. This study was conducted with students from two different elementary schools in Mersin, Turkey, who were enrolled in 7th or 8th grade in the 2009-2010 academic year. A total of 24 students participated in the program, 12 of whom…
Descriptors: Peer Teaching, Elementary School Students, Foreign Countries, Experimental Colleges
Ramorola, M. Z. – Africa Education Review, 2013
South African teachers are faced with challenges in integrating technology effectively into a coherent framework at school level. There seems to be little evidence of technology integration into classroom activities such as systematic planning and implementation of lessons that require learners to think critically, work collaboratively, and use…
Descriptors: Teaching Methods, Technology Integration, Secondary School Teachers, Secondary School Students
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security