Publication Date
In 2025 | 2 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 21 |
Since 2016 (last 10 years) | 31 |
Since 2006 (last 20 years) | 49 |
Descriptor
Computer Software | 49 |
Information Security | 49 |
Information Technology | 49 |
Computer Security | 23 |
Internet | 18 |
Foreign Countries | 12 |
Computer Science Education | 11 |
Privacy | 11 |
Computers | 9 |
Higher Education | 8 |
Information Management | 8 |
More ▼ |
Source
Author
Cummings, Jeff | 2 |
Janicki, Thomas | 2 |
Abhishek Vaish | 1 |
Abu Alam | 1 |
Alex Cameron | 1 |
Ali, Mohd Norawi | 1 |
Alper Yayla | 1 |
An, Ho | 1 |
Balaji, Venkataraman | 1 |
Bartolacci, Mike | 1 |
Brooks, Rochelle | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 19 |
Postsecondary Education | 18 |
Adult Education | 2 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Secondary Education | 2 |
Audience
Researchers | 2 |
Media Staff | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Asia | 2 |
South Korea | 2 |
Turkey | 2 |
United Kingdom | 2 |
United Kingdom (England) | 2 |
United States | 2 |
Arkansas | 1 |
Australia | 1 |
Belgium | 1 |
Bermuda | 1 |
Canada | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Hassan Mallam Ibrahim; Kamsuriah Ahmad; Hasimi Sallehudin – Education and Information Technologies, 2025
As the need for digital content increases almost daily, preserving this content for university libraries, especially in the least developed and developing nations, becomes a challenge, resulting in the loss of this data. Even though most of these libraries are automated and adopt one digital preservation strategy or the other, library users need…
Descriptors: Preservation, Technology Uses in Education, Research Libraries, Internet
Raza, Syed Ali; Khan, Komal Akram – Interactive Technology and Smart Education, 2022
Purpose: Collaboration, communication, critical thinking and creativity are the most essential Cs of education. However, at present, these Cs are interlinked with technology to make it more effective and reliable. Educational technology infuses higher education, many people use it on a daily basis. Students are eager to adopt such technologies…
Descriptors: Academic Achievement, Educational Technology, Higher Education, Internet
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Kaban, Abdullatif – Athens Journal of Education, 2021
Do we care about the security on the internet environment the way we do in the daily life safety of our children? In order to answer this question, this study aims to reveal what kind of education is provided at school about using secure internet. In accordance with this purpose, Information Technologies and Software Course textbooks at primary…
Descriptors: Internet, Information Security, Information Technology, Textbooks
Grech, Alex; Balaji, Venkataraman; Miao, Fengchun – Commonwealth of Learning, 2022
Blockchain is a verification infrastructure that offers a solution to the problem of how to verify digital identity. This publication is aimed at policy-makers in education who have an interest in understanding the affordances of blockchain technology to the education sector. Exploratory exercises with blockchain demonstrate that it is already…
Descriptors: Technology Uses in Education, Information Management, Information Security, Information Storage
Liew, Tze Wei; Pang, Wei Ming; Leow, Meng Chew; Tan, Su-Mae – Smart Learning Environments, 2022
Emotional design refers to imbuing a multimedia learning environment with design attributes that promote learners' positive affect and motivation to enhance learning. One such feature is anthropomorphism, in which human-like attributes are infused into learning elements in a multimedia learning environment. This study examines the affective,…
Descriptors: Multimedia Instruction, Instructional Design, Multimedia Materials, Human Body
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Kahraman, Deniz; Koc, Mustafa – International Society for Technology, Education, and Science, 2022
It is considered important for school principals to have technology leadership competencies in digital age conditions in order to carry out education and training efficiently and effectively. Since teachers see school principals as role models, how teachers perceive the technology use skills of school principals is an important factor for the…
Descriptors: Instructional Leadership, Educational Technology, Information Technology, Technology Integration