Publication Date
In 2025 | 6 |
Since 2024 | 10 |
Since 2021 (last 5 years) | 30 |
Since 2016 (last 10 years) | 49 |
Since 2006 (last 20 years) | 61 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Teachers | 5 |
Media Staff | 1 |
Researchers | 1 |
Location
United States | 5 |
Australia | 3 |
South Korea | 3 |
Canada | 2 |
China | 2 |
Poland | 2 |
Sweden | 2 |
United Kingdom | 2 |
Austria | 1 |
Belgium | 1 |
Bermuda | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Pell Grant Program | 1 |
Assessments and Surveys
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Chrispus Zacharia Oroni; Fu Xianping; Daniela Daniel Ndunguru; Arsenyan Ani – Education and Information Technologies, 2025
In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety…
Descriptors: Educational Technology, Electronic Learning, Information Security, Knowledge Level
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
Ece Gumusel – Journal of Education for Library and Information Science, 2025
The rapid advancement of technology has presented marginalized communities in libraries with numerous privacy and security challenges. Many researchers have emphasized the importance of Privacy-Enhancing Technologies (PETs), suggesting that these technical solutions can effectively assist users in safeguarding their personally identifiable…
Descriptors: Privacy, LGBTQ People, College Students, Information Science Education
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Taha, Nashrawan; Dahabiyeh, Laila – Education and Information Technologies, 2021
The rapid technological developments associated with the decrease in the cost of smartphones made the latter more accessible and convenient to be used. In an educational setting, students are increasingly bringing their smartphones to classrooms, this could have serious security implications, particularly when students are less aware of smartphone…
Descriptors: College Students, Information Security, Knowledge Level, Comparative Analysis
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Al-Azawei, Ahmed; Abdullah, Alharith A.; Mohammed, Mahmood K.; Abod, Zaid A. – International Review of Research in Open and Distributed Learning, 2023
Although online learning has become ubiquitous worldwide, earlier research has neglected the relationship between its actual use and security concerns. Learners' lack of security awareness while using learning technologies remains rarely studied. This paper integrates Delone and McLean's information system success (D&M-ISS) model with the…
Descriptors: Foreign Countries, Online Courses, Electronic Learning, Success
Bacak, Julie; Wagner, Jonathan; Martin, Florence; Byker, Erik; Wang, WeiChao; Alhgrim-Delzell, Lynn – Journal of Educational Technology Systems, 2023
K-12 schools utilize a growing number of technologies to operate effectively, ranging from technologies for learning to technologies that manage student and personnel data. We share findings from an analysis of 23 school district websites for technologies used in a number of K-12 school districts surrounding a public, research university in a…
Descriptors: Elementary Secondary Education, School Districts, Educational Technology, Classification
Ezeugo, Ernest; Klein, Carrie; Whitfield, Christina – State Higher Education Executive Officers, 2021
State postsecondary data systems contain a wealth of information--including detailed records about individuals--that allow states to analyze and improve their postsecondary education systems. The entities that maintain these systems operate in a context of concern about the privacy and security of educational records. They have both an interest in…
Descriptors: Privacy, Information Security, Information Systems, Postsecondary Education
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Fernández-Molina, Juan-Carlos; Eschenfelder, Kristin R.; Rubel, Alan P. – College & Research Libraries, 2021
This paper describes the results of a study to compare contemporary e-journal licenses from two research universities in the United States and Spain in terms of e-reserves, interlibrary loan, text and data mining, authors' rights and treatment of copyright exceptions, usage statistics, governing law, data privacy, and obligations entailing…
Descriptors: Foreign Countries, Academic Libraries, Research Universities, Electronic Journals