NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Renata Kochut; Thomas Brady – International Society for Technology, Education, and Science, 2024
This paper examines the Individualized Credit for Prior Learning (CPL) process in business education. It highlights its role in accrediting students' experiential learning and bridging practical experience with academic credit. This research then recommends solutions that include AI tools, advisor training, and centralized resource hubs. Most…
Descriptors: Business Education, Artificial Intelligence, Technology Uses in Education, Credits
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fry, Katherine – Journal of Media Literacy Education, 2015
One way to view the development of the media literacy movement is through the various different ways in which strains of media literacy education have been called on to allay fears that accompanying new media technologies. This article focuses on how one media literacy organization,The LAMP, deals with two very different arenas--the internet…
Descriptors: Media Literacy, Fear, Internet, Information Security
Fox, Christine; Jones, Rachel – State Educational Technology Directors Association, 2018
This publication highlights how state policies and guidance are supporting the transformation to personalized learning through digital instructional materials. Specifically, the report includes personalized learning approaches and the policies and processes around the selection, curation, procurement, professional learning and funding of digital…
Descriptors: State Policy, Individualized Instruction, Educational Technology, Technology Uses in Education
Jacobson, Rebecca; Saultz, Andrew; Snyder, Jeffrey W. – Phi Delta Kappan, 2013
Recognizing the need for information in public education, Congress mandated in the No Child Left Behind Act (NCLB) that all states create and disseminate annual school performance report cards. A decade after NCLB passed, school report cards are widely available for nearly every school in the country. As the amount of school performance data…
Descriptors: Report Cards, Annual Reports, School Statistics, Public Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawler, James P.; Molluzzo, John C.; Doshi, Vijal – Information Systems Education Journal, 2012
Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…
Descriptors: Social Networks, Privacy, Information Security, Student Attitudes
Business-Higher Education Forum, 2013
This is the first in a series of Business-Higher Education Forum (BHEF) playbooks intended to assist companies, higher education institutions, private philanthropies, membership associations, professional societies, government agencies, and other stakeholders seeking to understand the potential value of investing in coordinated strategic,…
Descriptors: Higher Education, Labor Force Development, Partnerships in Education, Academic Persistence
Lum, Lydia – CURRENTS, 2012
At the end of 2010, for the first time ever, smartphones outsold PCs. Mobile device adoption rates continue to rise rapidly around the world. A recent forecast by Cisco found that global mobile data traffic more than doubled last year, and by the end of 2012, the number of mobile devices in use will outnumber the world's population. In the United…
Descriptors: Foreign Countries, Higher Education, Community Colleges, Institutional Advancement
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education