NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 51 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ali, Mazurina Mohd; Zaharon, Nur Farhana Mohd – International Journal of Educational Reform, 2024
Internet users are becoming ignorant with their data and the transparency of information due to the nature of high-speed internet today. Regrettably, internet users are deceived by engineering tactics performed by highly trained people, namely cybercriminals. Thus, in order to combat phishing attacks, internet users should be educated on security…
Descriptors: Information Security, Governance, Data, Literature Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Elif Ozturk – Journal of Education in Science, Environment and Health, 2025
This study examines the pedagogical, ethical, and political dimensions of artificial intelligence (AI) in early childhood STEM education from a theoretical perspective. As digital technologies become increasingly prevalent in education, AI applications offer significant opportunities in areas such as personalized learning experiences, game-based…
Descriptors: Early Childhood Education, STEM Education, Artificial Intelligence, Game Based Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Qinyi; Khalil, Mohammad – British Journal of Educational Technology, 2023
The field of learning analytics has advanced from infancy stages into a more practical domain, where tangible solutions are being implemented. Nevertheless, the field has encountered numerous privacy and data protection issues that have garnered significant and growing attention. In this systematic review, four databases were searched concerning…
Descriptors: Privacy, Data, Information Security, Learning Analytics
Peer reviewed Peer reviewed
Direct linkDirect link
Moraes, Eduardo Baldo; Kipper, Liane Mahlmann; Hackenhaar Kellermann, Ana Clara; Austria, Leonardo; Leivas, Pedro; Moraes, Jorge André Ribas; Witczak, Marcus – Interactive Technology and Smart Education, 2023
Purpose: The purpose of this study is to identify the uses of Industry 4.0 technologies in the area of education and how they contribute to learning in addition to highlighting at what educational level they are used. Design/methodology/approach: A systematic literature review was carried out in the Scopus (Elsevier), Web of Science and…
Descriptors: Educational Technology, Internet, Computer Simulation, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Bendler, Daniel; Felderer, Michael – ACM Transactions on Computing Education, 2023
Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the…
Descriptors: Models, Information Security, Computer Security, Competence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
María-Jesús Gallego-Arrufat; Inmaculada García-Martínez; María-Asunción Romero-López; Norma Torres-Hernández – Education Policy Analysis Archives, 2024
Studies on digital rights in education have both gained attention and provided a framework for research, policy and practice in educational research within the field of educational technology. The potential benefits we appreciate in Internet use are inseparable from the maximum risks involved. Faced with this responsibility, individuals demand…
Descriptors: Civil Rights, Privacy, Internet, Citizenship Education
Peer reviewed Peer reviewed
Direct linkDirect link
Bashir, Faiza; Warraich, Nosheen Fatima – Interactive Learning Environments, 2023
The study intends to identify the emerging themes of e-learning through the Semantic Web. To highlight the key challenges and explore the core benefits of this mesmerizing technology was another goal of the study. To get the set goals researchers systematically reviewed the literature in five leading databases, out of which one specialized…
Descriptors: Electronic Learning, Technology Uses in Education, Internet, Semantics
Peer reviewed Peer reviewed
Direct linkDirect link
Labaran Isiaku; Ahmet Adalier – On the Horizon, 2025
Purpose: This study aims to investigate the challenges associated with the integration and implementation of blockchain technology in the education sector. The primary objective is to identify and categorize these challenges using the Technology-Organization-Environment (TOE) framework, shedding light on the technological, organizational and…
Descriptors: Literature Reviews, Technology Uses in Education, Information Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Estel·la Ramírez-Baraldes; Daniel García-Gutiérrez; Cristina García-Salido – European Journal of Education, 2025
To explore the opportunities and challenges of artificial intelligence (AI) in nursing and its impact. Bibliographic review using Arksey and O'Malley's framework, enhanced by Levac, Colquhoun and O'Brien and following PRISMA guidelines, including qualitative and mixed studies. MeSH terms and keywords such as nursing education and ethical…
Descriptors: Artificial Intelligence, Nursing, Nursing Education, Barriers
Peer reviewed Peer reviewed
Direct linkDirect link
Prinsloo, Paul; Slade, Sharon; Khalil, Mohammad – British Journal of Educational Technology, 2023
Since the emergence of learning analytics (LA) in 2011 as a distinct field of research and practice, multimodal learning analytics (MMLA), shares an interdisciplinary approach to research and practice with LA in its use of technology (eg, low cost sensors, wearable technologies), the use of artificial intelligence (AI) and machine learning (ML),…
Descriptors: Multimedia Instruction, Learning Analytics, Privacy, Student Rights
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Weitl-Harms, Sherri; Spanier, Adam; Hastings, John; Rokusek, Matthew – Journal of Cybersecurity Education, Research and Practice, 2023
Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework.…
Descriptors: Gamification, Undergraduate Students, Information Security, Game Based Learning
Peer reviewed Peer reviewed
Direct linkDirect link
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Haque, Mustafizul; Kumar, V. Vijaya; Singh, Preeti; Goyal, Adheer A.; Upreti, Kamal; Verma, Ankit – Education and Information Technologies, 2023
Now a days with the rapidly increasing development of technology and communication system, the implementation of blockchain is continuously increasing in various sectors. With the increase in massive data in educational sectors there arise a requirement of handling such enormous data. This can be easily and securely handled by blockchain…
Descriptors: Meta Analysis, Information Technology, Technology Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4