NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 15 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ravendran, Saravnesvaran; Karpudewan, Mageswary; Ali, Mohd Norawi; Lay, Yoon Fah – Malaysian Online Journal of Educational Sciences, 2023
The Fourth Industrial Revolution (4IR) refers to the current rapid technological growth that fundamentally changes how humans live. 4IR is essential to improve higher education worldwide and develop crucial skills such as e-learning and innovation, information and media technology, and life and career skills. This study aims to assess the…
Descriptors: Technological Advancement, Foreign Countries, Technological Literacy, Pedagogical Content Knowledge
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kahraman, Deniz; Koc, Mustafa – International Society for Technology, Education, and Science, 2022
It is considered important for school principals to have technology leadership competencies in digital age conditions in order to carry out education and training efficiently and effectively. Since teachers see school principals as role models, how teachers perceive the technology use skills of school principals is an important factor for the…
Descriptors: Instructional Leadership, Educational Technology, Information Technology, Technology Integration
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Waguespack, Leslie J. – Information Systems Education Journal, 2014
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
Descriptors: Computer Security, Internet, Information Systems, Computer Software
Srinivasan, Deepa – ProQuest LLC, 2013
Recent rapid malware growth has exposed the limitations of traditional in-host malware-defense systems and motivated the development of secure virtualization-based solutions. By running vulnerable systems as virtual machines (VMs) and moving security software from inside VMs to the outside, the out-of-VM solutions securely isolate the anti-malware…
Descriptors: Computer Security, Computer Software, Semantics, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Mendoza-Gonzalez, Ricardo, Ed. – IGI Global, 2016
In today's society, educational opportunities have evolved beyond the traditional classroom setting. Most universities have implemented virtual learning environments in an effort to provide more opportunities for potential or current students seeking alternative and more affordable learning solutions. "User-Centered Design Strategies for…
Descriptors: Online Courses, Curriculum Design, Virtual Classrooms, Best Practices
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Woollard, John – Routledge, Taylor & Francis Group, 2011
"Psychology for the Classroom: E-Learning" is a lively and accessible introduction to the field of technology-supported teaching and learning and the educational psychology associated with those developments. Offering a substantial and useful analysis of e-learning, this practical book includes current research, offers a grounding in both theory…
Descriptors: Electronic Learning, Blended Learning, Social Justice, Constructivism (Learning)
Peer reviewed Peer reviewed
Rowe, Neil C.; Schiavo, Sandra – Computers & Education, 1998
Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…
Descriptors: Alarm Systems, Artificial Intelligence, Computer Assisted Instruction, Computer Networks
Smith, Peter, Ed. – Association of Small Computer Users in Education (ASCUE), 2009
The Association of Small Computer Users in Education (ASCUE) is a dynamic organization for people interested in small college technology issues. Its members include information technology professionals, instructional technologists, and faculty members from all over the world who use computers and technology to support teaching and learning. The…
Descriptors: Small Colleges, Information Technology, Educational Technology, Organizations (Groups)
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers