Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Author
Publication Type
Journal Articles | 10 |
Reports - Research | 6 |
Reports - Evaluative | 3 |
Reports - Descriptive | 2 |
Information Analyses | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
Europe | 11 |
Asia | 4 |
North America | 4 |
Australia | 3 |
South America | 3 |
United States | 2 |
Africa | 1 |
China | 1 |
Cyprus | 1 |
Massachusetts | 1 |
New Zealand | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Prince Chukwuneme Enwereji; Annelien Adriana van Rooyen; Ilse Morgan – Research in Social Sciences and Technology, 2024
Social network sites, most notably Facebook, have fundamentally transformed the way information is transferred, received, and shared by individuals and organisations. This article explores the diverse contexts in which Facebook is utilised as a knowledge-sharing instrument, along with the key challenges encountered in adopting Facebook as a…
Descriptors: Social Media, Sharing Behavior, Barriers, Costs
Hoel, Tore; Chen, Weiqin – International Journal of Information and Learning Technology, 2019
Purpose: Privacy is a culturally universal process; however, in the era of Big Data privacy is handled very differently in different parts of the world. This is a challenge when designing tools and approaches for the use of Educational Big Data (EBD) and learning analytics (LA) in a global market. The purpose of this paper is to explore the…
Descriptors: Privacy, Learning Analytics, Information Security, Data
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods
Fedorova, Elena P.; Skobleva, Ella I. – European Journal of Contemporary Education, 2020
Emergence and development of the blockchain technology, which is able to transform into "a most powerful disruptive innovation", shall definitely concern universities. Moreover, nowadays the blockchain technology meets the challenges that both the system of higher education and the entire society are currently facing. Advantages of the…
Descriptors: Higher Education, Foreign Countries, Competence, Productivity
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Khalil, Mohammad; Prinsloo, Paul; Slade, Sharon – International Review of Research in Open and Distributed Learning, 2018
While many strategies for protecting personal privacy rely on regulatory frameworks, consent, and anonymizing data, they are not always effective. Terms and Conditions often lag behind advances in technology, software, and user behaviours, and consent to use data for a range of unclear purposes may be provided unwittingly. As the commercial market…
Descriptors: Large Group Instruction, Online Courses, Educational Technology, Technology Uses in Education
van der Vlies, Reyer – OECD Publishing, 2020
This working paper identifies OECD countries' interests in digital innovation in education by analysing their policy papers on digital education. Many OECD countries have adopted a specific strategy on digital education, or integrated the topic in a generic strategy on digital innovation as such. The ideas that are expressed in the strategies…
Descriptors: Educational Technology, Technology Uses in Education, Educational Policy, Technology Integration
Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich – Journal of Learning Analytics, 2016
To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…
Descriptors: Privacy, Guidelines, Ethics, Information Security
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities