Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 15 |
Descriptor
Source
Author
Yang, Li | 2 |
Yuan, Xiaohong | 2 |
Chu, Bei-Tseng | 1 |
Cummings, Jeff | 1 |
Doreen Mushi | 1 |
Drew Polly | 1 |
Florence Martin | 1 |
Gemin, Butch | 1 |
Gleghorn, Gregory D. | 1 |
Grant, Donna | 1 |
Grover, Mark | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 6 |
Reports - Research | 5 |
Collected Works - Proceedings | 2 |
Books | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 8 |
Early Childhood Education | 2 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Two Year Colleges | 2 |
Grade 1 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Policymakers | 1 |
Location
North Carolina | 15 |
Virginia | 5 |
Kentucky | 4 |
Ohio | 4 |
Georgia | 3 |
Maryland | 3 |
West Virginia | 3 |
California | 2 |
Connecticut | 2 |
Florida | 2 |
Indiana | 2 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Florence Martin; Doreen Mushi; Siyu Long; Julie Bacak; Drew Polly; Weichao Wang; Lynn Ahlgrim-Delzell – Journal of Technology and Teacher Education, 2024
Digital safety involves protecting oneself, and one's personal information to mitigate the risks that are inherently associated with using digital technologies. This study employed a multi-method design to explore 26 inservice and preservice elementary teacher experiences from attending a professional development on digital safety and facilitating…
Descriptors: Safety, Preservice Teachers, Elementary School Teachers, Summer Programs
Jeremy Roschelle; Judi Fusco; Pati Ruiz – Digital Promise, 2024
As Artificial Intelligence within education becomes increasingly important, Digital Promise reviewed the guidance documents released by seven states--California, North Carolina, Ohio, Oregon, Virginia, Washington state, and West Virginia--on how to approach artificial intelligence (AI) in education. Throughout this report the authors summarize the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Employment Qualifications, Responsibility
Siddiqi, Javaid; Mikolowsky, James – Hunt Institute, 2020
Many state and institution leaders have focused a considerable amount of energy on the development of data-driven student support tools that can be used for a variety of purposes. But tools aren't enough to drive progress -- policymakers must also consider the human component of the equation and explore best practices of how such tools, and the…
Descriptors: Educational Attainment, Postsecondary Education, Best Practices, Educational Policy
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Grover, Mark; Reinicke, Bryan; Cummings, Jeff – Information Systems Education Journal, 2016
As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…
Descriptors: Information Technology, Information Security, Evaluation Methods, Program Evaluation
Yuan, Xiaohong; Williams, Kenneth; Yu, Huiming; Rorrer, Audrey; Chu, Bei-Tseng; Yang, Li; Winters, Kathy; Kizza, Joseph – Journal of Information Systems Education, 2017
Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop them and integrate them into curricula. Under the support of the National Science Foundation (NSF) Scholarship for Service program, we…
Descriptors: Case Studies, Information Security, Teacher Workshops, Teaching Methods
Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna – Information Systems Education Journal, 2013
Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…
Descriptors: Undergraduate Students, Information Systems, Information Security, Curriculum Development
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Data Quality Campaign, 2016
Every state can create secure, robust linkages between early childhood and K-12 data systems, and effectively use the information from these linkages to implement initiatives to support programs and children, answer key policy questions, and be transparent about how the state's early childhood investments prepare students for success in school and…
Descriptors: Early Childhood Education, Elementary School Curriculum, Data, Program Implementation
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Jameson, Daphne A. – Business and Professional Communication Quarterly, 2014
When Chiquita Brands considered relocating its corporate headquarters, competing cities started Twitter campaigns to influence the decision by communicating directly with the chief executive officer. As he used the new microblogging channel, some of his previously private communication became public, some personal communication became…
Descriptors: Business Communication, Communication Strategies, Social Networks, Web 2.0 Technologies
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Gleghorn, Gregory D. – ProQuest LLC, 2011
Human capital theory suggests the knowledge, skills, and abilities one obtains through experience, on-the-job training, or education enhances one's productivity. This research was based on human capital theory and promotability (i.e., upward mobility). The research offered in this dissertation shows what effect obtaining information security…
Descriptors: Human Capital, Information Systems, Hypothesis Testing, Vendors
Gemin, Butch; Pape, Larry; Vashaw, Lauren; Watson, John – Evergreen Education Group, 2015
Online learning has steadily become a more integral strategy for schools and districts in their efforts to offer students greater access to the courses they need. Where in the past, much of the online learning activity happened at the state level or regional level, more and more schools are exercising greater control over their online and digital…
Descriptors: Elementary Secondary Education, Electronic Learning, Educational Policy, Educational Practices
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information