Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 10 |
Descriptor
| Computer Security | 10 |
| Foreign Countries | 10 |
| Interviews | 10 |
| Internet | 6 |
| Educational Technology | 4 |
| Case Studies | 3 |
| Information Security | 3 |
| Privacy | 3 |
| Qualitative Research | 3 |
| Questionnaires | 3 |
| Teacher Attitudes | 3 |
| More ▼ | |
Source
| Australian Educational… | 2 |
| ProQuest LLC | 2 |
| Alberta Education | 1 |
| Education for Information | 1 |
| International Journal of… | 1 |
| International Journal of… | 1 |
| Journal of Information… | 1 |
| Online Submission | 1 |
Author
| Armstead, Stanley K. | 1 |
| Booth, Kate | 1 |
| Costa, Conceição | 1 |
| Henriques, Sara | 1 |
| Jacka, Lisa | 1 |
| Jokela, Paivi | 1 |
| Karlsudd, Peter | 1 |
| Kuzu, Abdullah | 1 |
| Leteane, Oratile | 1 |
| Moakofhi, Moakofhi | 1 |
| Mutula, Stephen M. | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 8 |
| Journal Articles | 7 |
| Dissertations/Theses -… | 2 |
| Guides - Non-Classroom | 1 |
| Information Analyses | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 4 |
| Elementary Secondary Education | 3 |
| Elementary Education | 2 |
| Postsecondary Education | 2 |
| Secondary Education | 2 |
| High Schools | 1 |
Audience
| Administrators | 1 |
| Policymakers | 1 |
| Practitioners | 1 |
Laws, Policies, & Programs
| Equal Access | 1 |
| United Nations Convention on… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Armstead, Stanley K. – ProQuest LLC, 2017
In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…
Descriptors: Military Personnel, Foreign Countries, Computer Security, Information Security
Costa, Conceição; Sousa, Carla; Rogado, José; Henriques, Sara – International Journal of Game-Based Learning, 2017
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception. According to Livingstone, Carr and Byrne (2015), Internet governance…
Descriptors: Foreign Countries, Treaties, Childrens Rights, International Law
Thompson, Roberta – Australian Educational Computing, 2016
Young people's online safety continues to be a high priority for educators and parents. Cybersafety policies and educational programs are continually updated and revised to accommodate for the innovative ways they engage with digital culture. However, empirical research has shown that despite these efforts young people, especially teen girls,…
Descriptors: Adolescents, Females, Computer Security, Safety
Moakofhi, Moakofhi; Leteane, Oratile; Phiri, Tawona; Pholele, Thato; Sebalatlheng, Perncy – International Journal of Education and Development using Information and Communication Technology, 2017
The integration of technology in the education process has immensely improved the acquisition and retention of knowledge. Although e-learning initiatives bring many advantages to the education system, these rewards have not been fully realised in developing countries like Botswana. Therefore, in the current study, authors set out to identify…
Descriptors: Foreign Countries, Electronic Learning, Barriers, Agricultural Education
Newmeyer, Kevin Patrick – ProQuest LLC, 2014
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Descriptors: Foreign Countries, Developing Nations, Computer Security, Information Security
Nyagowa, Hesbon O.; Ocholla, Dennis N.; Mutula, Stephen M. – Education for Information, 2013
This study was conducted to determine the effect of a set of dimensions on e-School success in a cross-sectional study of NEPAD's e-School pilot in Kenya. All of the six e-Schools participating in the NEPAD's e-School pilot in Kenya were selected. The study used survey methodology. Students and teachers in those schools formed the study…
Descriptors: Computer Security, Foreign Countries, User Satisfaction (Information), Pilot Projects
Jacka, Lisa; Booth, Kate – Australian Educational Computing, 2012
Virtual worlds are highly immersive, engaging and popular computer mediated environments being explored by children and adults. Why then aren't more teachers using virtual worlds in the classroom with primary and secondary school students? Reasons often cited are the learning required to master the technology, low-end graphics cards, poor…
Descriptors: Foreign Countries, Computer Security, Educational Technology, Regional Programs
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews
Jokela, Paivi; Karlsudd, Peter – Journal of Information Technology Education, 2007
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Descriptors: Higher Education, Plagiarism, Distance Education, Confidentiality

Direct link
Peer reviewed
