NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 36 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hermida, Martin; Imlig-Iten, Nina; Schrackmann, Iwan; Marinus, Eva – Teaching Education, 2023
With the ubiquity of digital media, managing personal data has become part of our daily lives. Teachers have to manage not only their own data, they also manage students' sensitive data and furthermore have to teach data protection to students. In Switzerland, teacher education colleges have hence started to educate students about privacy and data…
Descriptors: Preservice Teachers, Student Attitudes, Social Networks, Data
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eyuboglu, Fatma Aycan Binay; Yilmaz, Fatma Gizem Karaoglan – Education Quarterly Reviews, 2022
Individuals may encounter many negativities due to the misuse of computers and the Internet. Children suffer the most from these negativities. This situation necessitates parents who always protect and stand by their children, to become knowledgeable about the safe use of computers and the Internet. In this study, we examined the opinions of the…
Descriptors: Parent Attitudes, Internet, Computer Uses in Education, Child Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Cavus, Nadire; Ercag, Erinc – British Journal of Educational Technology, 2016
There has been an increase in the vulnerability in Internet security, and the unconscious usage of the Internet is a very important issue throughout the world as it is in Cyprus today. The best way to solve such an issue would be to make people aware of this situation. Based on this idea, teachers should firstly be trained to use the Internet in a…
Descriptors: Foreign Countries, Self Efficacy, Internet, Safety
Gregory, Mark A; Cradduck, Lucy – International Association for Development of the Information Society, 2016
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Descriptors: Foreign Countries, Computer Security, Telecommunications, National Security
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Peer reviewed Peer reviewed
Direct linkDirect link
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Deveci Topal, Arzu; Kolburan Gecer, Aynur – Educational Research and Reviews, 2015
The development of web 2.0 technology has resulted in an increase in internet sharing. The scope of this study is social networking, which is one of the web 2.0 tools most heavily used by internet users. In this paper, the unethical behaviours that preservice teachers encounter on social networks and the ways to deal with these problems are…
Descriptors: Preservice Teachers, Ethics, Social Networks, Web 2.0 Technologies
Peer reviewed Peer reviewed
Direct linkDirect link
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Neville, Karen; Heavin, Ciara – Electronic Journal of e-Learning, 2013
The emergence of social media has forced educators to think differently about the way learning occurs. Students and practitioners alike are using new technologies to connect with peers/colleagues, share ideas, resources and experiences for extracurricular activities. The social business gaming platform considered in this study leverages the social…
Descriptors: Foreign Countries, Social Networks, Internet, Computer Security
Wespieser, Karen – National Foundation for Educational Research, 2015
This report looks at the online activities of London's young people. The report highlights that children and young people use technology to have fun, study and communicate with others. Most children and young people have positive experiences online. On the whole they are sensible online and do not put themselves "at risk". However, the…
Descriptors: Foreign Countries, Internet, Children, Youth
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Miseviciene, Regina; Ambraziene, Danute; Tuminauskas, Raimundas; Pažereckas, Nerijus – Informatics in Education, 2012
Many factors influence education nowadays. Educational institutions are faced with budget cuttings, outdated IT, data security management and the willingness to integrate remote learning at home. Virtualization technologies provide innovative solutions to the problems. The paper presents an original educational infrastructure using virtualization…
Descriptors: Computer Simulation, Universities, College Students, College Faculty
Previous Page | Next Page »
Pages: 1  |  2  |  3