NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers2
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 66 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Farrukh Shahzad; Shuo Xu; Iqra Javed – International Journal of Educational Technology in Higher Education, 2024
As technology continues to advance, the integration of generative artificial intelligence tools in various sectors, including education, has gained momentum. ChatGPT, an extensively recognized language model created by OpenAI, has gained significant importance, particularly in education. This study investigates the awareness, acceptance, and…
Descriptors: Artificial Intelligence, Computer Software, College Students, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mustafa Koc; Sema Golcukcu – International Society for Technology, Education, and Science, 2024
While there are many conveniences that the widespread use of the Internet provides us today, there are also some risks that come with these conveniences. One of these risks is the disclosure of personal data. Personal data can be defined as any information regarding an identified or identifiable real person. It can be argued that wide use of…
Descriptors: Preservice Teachers, Teacher Education Programs, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lionel Mew; William H. Money – Information Systems Education Journal, 2024
Since it was released on November 30, 2022, ChatGPT has offered numerous opportunities for higher education professors to improve their course offerings. However, not all information provided by the application is accurate. The application has been known to yield highly inaccurate information with high confidence. Yet, with that knowledge, ChatGPT…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Library Research
Gary Allen Harris – ProQuest LLC, 2024
Literature demonstrates that threats and attacks on computer systems and networks have been around since the beginning of computing, and the number, severity, sophistication, and costs of attacks and data breaches are continuing to grow. Several studies suggest that one of the most common causes of data breaches is insecure web applications that…
Descriptors: Undergraduate Study, Web Sites, Computer Software, Engineering Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Noureldin Mohamed Abdelaal; Islam Al Sawi – Australian Journal of Applied Linguistics, 2024
Artificial Intelligence (AI) has emerged as a prominent area of investigation in the field of education. Also, perceptions, challenges and threats of AI among university professors show notable variations. This study explores university professors' perspectives regarding AI, including their familiarity with AI, its educational impacts, challenges…
Descriptors: Artificial Intelligence, College Faculty, Teacher Attitudes, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wanju – TechTrends: Linking Research and Practice to Improve Learning, 2023
A design case is a form of scholarly writing in which the author embarks on a reflective journey sharing rich descriptions of their design, design processes, challenges, etc. This paper presents two design cases that demonstrate how learning theories and instructional design concepts were purposefully incorporated in two instructional applications…
Descriptors: Learning Processes, Instructional Design, Learning Theories, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Raza, Syed Ali; Khan, Komal Akram – Interactive Technology and Smart Education, 2022
Purpose: Collaboration, communication, critical thinking and creativity are the most essential Cs of education. However, at present, these Cs are interlinked with technology to make it more effective and reliable. Educational technology infuses higher education, many people use it on a daily basis. Students are eager to adopt such technologies…
Descriptors: Academic Achievement, Educational Technology, Higher Education, Internet
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5