NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing all 10 results Save | Export
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Norma Torres-Hernández; María-Jesús Gallego-Arrufat; María del Mar García-Ruiz – Digital Education Review, 2023
Online risks are a concern for citizens in the digital society. Many sectors of the population lack training to face, prevent and solve problematic situations arising from Internet use. University researchers and innovation agents in small towns in southern Spain are carrying out an educational programme of 13 intergenerational workshops to…
Descriptors: Intergenerational Programs, Digital Literacy, Internet, Open Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Karagozlu, Damla – Cypriot Journal of Educational Sciences, 2020
As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study…
Descriptors: Preservice Teachers, Computer Security, Information Security, Student Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Chiner, Esther; Gómez-Puerta, Marcos; Cardona-Moltó, María Cristina – British Journal of Learning Disabilities, 2017
Background: Internet offers opportunities to people with intellectual disabilities, but it also involves some risks. The aim of this study was to explore these issues considering caregivers and people with intellectual disabilities' perspectives. Materials and Methods: A descriptive, cross-sectional study was conducted. The sample consisted of 77…
Descriptors: Internet, Intellectual Disability, Caregivers, Attitude Measures
Alshareef, Naser – International Association for Development of the Information Society, 2016
Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…
Descriptors: Information Security, Risk, Qualitative Research, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – Learning, Media and Technology, 2013
Despite widespread internet provision in UK schools, there is little evidence to suggest resultant, sustained educational benefit. Drawing upon the notion of over-blocking, this paper explores how narrow notions of digital learning and over-zealous responses to internet risks limit students' educational experience. It is argued that this…
Descriptors: Foreign Countries, Educational Technology, Internet, Computer Security
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Mekdeci, Kelly Broyles – ProQuest LLC, 2011
United States schools and American Overseas (A/OS) schools depend upon educational technology (ET) to support business operations and student learning experiences. Schools rely upon administrative software, on-line course modules, information databases, digital communications systems, and many other ET processes. However, ET's fragility compared…
Descriptors: Foreign Countries, Educational Technology, Computer Uses in Education, Institutional Mission
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology