NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Huiling Ma; Lilliati Ismail; Weijing Han – Education and Information Technologies, 2024
The advancement and application of Artificial Intelligence (AI) has introduced innovative changes in language learning and teaching. In particular, the widespread utilization of various chatbots as foreign language learning partners showcases their remarkable potential contribution to the field. Nevertheless, there are currently few studies that…
Descriptors: Bibliometrics, Artificial Intelligence, Computer Software, Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Hassan Mallam Ibrahim; Kamsuriah Ahmad; Hasimi Sallehudin – Education and Information Technologies, 2025
As the need for digital content increases almost daily, preserving this content for university libraries, especially in the least developed and developing nations, becomes a challenge, resulting in the loss of this data. Even though most of these libraries are automated and adopt one digital preservation strategy or the other, library users need…
Descriptors: Preservation, Technology Uses in Education, Research Libraries, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Jewan; Mansotra, Vibhakar; Mir, Shabir Ahmad; Parveen, Shahzada – Education and Information Technologies, 2021
Nowadays Cloud computing technology is considered pivotal for the success of any business or organisation. This technology is not just an infrastructure that is used to implement various strategies rather it makes new emerging strategies possible. However, to embrace this emerging technology, the challenges and uncertainties about the expected…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Beuran, Razvan; Tang, Dat; Tan, Zheyu; Hasegawa, Shinobu; Tan, Yasuo; Shinoda, Yoichi – Education and Information Technologies, 2019
Cybersecurity education and training are being conducted on an ever-increasing scale, as most organizations need to improve their readiness in dealing with the more and more frequent cyberattacks. However, most systems used for such education and training purposes are built from scratch, are highly customized, and often proprietary. This is true…
Descriptors: Information Security, Teaching Methods, Management Systems, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Ullah, Abrar; Xiao, Hannan; Barker, Trevor – Education and Information Technologies, 2019
Online examinations are an integral component of online learning environments and research studies have identified academic dishonesty as a critical threat to the credibility of such examinations. Academic dishonesty exists in many forms. Collusion is seen as a major security threat, wherein a student invites a third party for help or to…
Descriptors: Usability, Information Security, Computer Assisted Testing, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Al Matrooshi, Mohammed; Al Bairaq, Saeed; Ibrahim, Walid; Masud, Mohammad M. – Education and Information Technologies, 2017
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to students' daily lives). Particularly, information security education should reflect the current…
Descriptors: Telecommunications, Handheld Devices, Student Interests, Best Practices