NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Janicki, Thomas; Cummings, Jeffrey – Information Systems Education Journal, 2022
As the skills and competencies needed by Information Systems (IS) undergraduates continues to grow, various IS professional societies have developed recommendations which are updated on a periodic basis. These recommendations known as 'model curricula' are a guide for faculty and institutions to consider when developing or evaluating the…
Descriptors: Information Science Education, Information Systems, Computer Software, Undergraduate Students
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Hopkins, Liza; Wadley, Greg; Vetere, Frank; Fong, Maria; Green, Julie – Australian Journal of Education, 2014
Reduced school attendance is a recognised risk factor for poorer outcomes both educationally and across a wide range of social, economic and personal indicators throughout life. Children and young people with chronic health conditions often have poor or disrupted records of school attendance due to periods of hospitalisation and time spent…
Descriptors: Technology Integration, Hospitalized Children, Elementary School Students, At Risk Students
Yang, Yubao – ProQuest LLC, 2011
Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…
Descriptors: Information Security, Surveys, Information Technology, Economic Factors