Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 8 |
Foreign Countries | 8 |
Statistical Analysis | 8 |
Computer Software | 4 |
Internet | 4 |
Comparative Analysis | 3 |
Data Analysis | 3 |
Educational Environment | 3 |
Information Technology | 3 |
Knowledge Level | 3 |
Research Methodology | 3 |
More ▼ |
Source
RAND Corporation | 2 |
Educational Technology &… | 1 |
IEEE Transactions on Education | 1 |
Interdisciplinary Journal of… | 1 |
International Educational… | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Author
Botterman, Maarten | 2 |
Cremonini, Leon | 2 |
Ettedgui, Emile | 2 |
Graafland-Essers, Irma | 2 |
Annessi, Robert | 1 |
Bernhardt, Valentin | 1 |
Boutnaru, Shlomi | 1 |
Frkat, Davor | 1 |
Hailu, Alemayehu | 1 |
Hershkovitz, Arnon | 1 |
Hou, Huei-Tse | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Reports - Evaluative | 2 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Postsecondary Education | 4 |
Secondary Education | 3 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Grade 6 | 2 |
Higher Education | 2 |
Intermediate Grades | 2 |
Middle Schools | 2 |
Grade 11 | 1 |
Grade 12 | 1 |
Grade 5 | 1 |
More ▼ |
Audience
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
What Works Clearinghouse Rating
Yilmaz, Ramazan; Karaoglan Yilmaz, F. Gizem; Özturk, H. Tugba; Karademir, Tugra – Online Submission, 2017
Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome…
Descriptors: Foreign Countries, Secondary School Students, Computer Use, Internet
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Sun, Jerry Chih-Yuan; Kuo, Cian-Yu; Hou, Huei-Tse; Lin, Yu-Yan – Educational Technology & Society, 2017
The purposes of this study were to provide a game-based anti-phishing lesson to 110 elementary school students in Taiwan, explore their learning behavioral patterns, and investigate the effects of the flow states on their learning behavioral patterns and learning achievement. The study recorded behaviour logs, and applied a pre- and post-test on…
Descriptors: Educational Games, Electronic Learning, Educational Technology, Elementary School Students
Boutnaru, Shlomi; Hershkovitz, Arnon – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2015
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…
Descriptors: Computer Software, Computer Security, Programming Languages, Computer Science Education
Hailu, Alemayehu – ProQuest LLC, 2012
Adoption of new technology has complicating components both from the selection, as well as decision-making criteria and process. Although new technology such as cloud computing provides great benefits especially to the developing countries, it has challenges that may complicate the selection decision and subsequent adoption process. This study…
Descriptors: Information Technology, Adoption (Ideas), Influences, Developing Nations
Graafland-Essers, Irma; Cremonini, Leon; Ettedgui, Emile; Botterman, Maarten – RAND Corporation, 2003
This report presents the current understanding of the advancement of the Information Society within the European Union and countries that are up for accession in 2004, and is based on the SIBIS (Statistical Indicators Benchmarking the Information Society) surveys and analyses per SIBIS theme and country. The report is unique in its coherent and…
Descriptors: Information Technology, Foreign Countries, Technological Advancement, Measurement
Graafland-Essers, Irma; Cremonini, Leon; Ettedgui, Emile; Botterman, Maarten – RAND Corporation, 2003
This report presents the current understanding of the advancement of the Information Society within the European Union and countries that are up for accession in 2004, and is based on the SIBIS (Statistical Indicators Benchmarking the Information Society) surveys and analyses per SIBIS theme and country. The report is unique in its coherent and…
Descriptors: Information Technology, Foreign Countries, Technological Advancement, Measurement
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection