NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Himel Mondal; Juhu Kiran Krushna Karri; Swaminathan Ramasubramanian; Shaikat Mondal; Ayesha Juhi; Pratima Gupta – Advances in Physiology Education, 2025
Large language models (LLMs)-based chatbots use natural language processing and are a type of generative artificial intelligence (AI) that is capable of comprehending user input and generating output in various formats. They offer potential benefits in medical education. This study explored the student's feedback on the utilization of LLMs in…
Descriptors: Computational Linguistics, Physiology, Teaching Methods, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chin, Amita G.; Little, Philip; Jones, Beth H. – International Journal of Education and Development using Information and Communication Technology, 2020
In 2019, the number of smartphone users in the United States was estimated to be over 266 million, or 81% of the population. While smartphones, combined with a plethora of apps that are readily available, have become wholly integrated into our daily lives, they embody a multitude of risks for consumers. The purpose of this study is to assess…
Descriptors: State Universities, Undergraduate Students, Telecommunications, Handheld Devices
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Ye, Pinghao; Liu, Liqiong; Gao, Linxia; Mei, Quanjun – International Journal of Information and Communication Technology Education, 2020
The article finds the main factors affecting women's continuance intention for mobile games, and analyze how and to what extent these factors affect women's continuance intention for mobile games in a research model. In this study, a Model of Factors Affecting Women's continued interest in mobile gaming is comprised of eight variables and relevant…
Descriptors: Females, Computer Games, Telecommunications, Handheld Devices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alharbi, Wafa Owaydhah; Alturki, Khaled Ibrahim – English Language Teaching, 2018
The study aimed to identify the degree of social media contribution to reinforcing digital citizenship meaning from the viewpoint of female students at Imam Mohammed bin Saud Islamic University in Riyadh. The study was an attempt to answer the following two questions in order to achieve the objectives of the study: To which extent does SnapChat…
Descriptors: Social Media, Females, Foreign Countries, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Zilka, Gila Cohen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Aim/Purpose: Following the widespread use of social networking applications (SNAs) by children, adolescents, and young adults, this paper sought to examine the usage habits, sharing, and dangers involved from the perspective of the children, adolescents, and young adults. The research question was: What are the usage habits, sharing, drawbacks,…
Descriptors: Social Networks, Young Adults, Gender Differences, Bullying
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Al Matrooshi, Mohammed; Al Bairaq, Saeed; Ibrahim, Walid; Masud, Mohammad M. – Education and Information Technologies, 2017
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to students' daily lives). Particularly, information security education should reflect the current…
Descriptors: Telecommunications, Handheld Devices, Student Interests, Best Practices
Fleming, Antoine – ProQuest LLC, 2017
Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…
Descriptors: Information Security, Case Studies, Qualitative Research, Holistic Approach
Adamo, Oluwayomi – ProQuest LLC, 2011
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
Descriptors: Coding, Technology, Error Correction, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Previous Page | Next Page ยป
Pages: 1  |  2