NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 126 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Tian Luo; Pauline S. Muljana; Xinyue Ren; Dara Young – Educational Technology Research and Development, 2025
The emergence of generative artificial intelligence (GenAI) has caused significant disruptions on a global scale in various workplace settings, including the field of instructional design (ID). Given the paucity of research investigating the impact of GenAI on ID work, we conducted a mixed methods study to understand instructional designers (IDs)'…
Descriptors: Artificial Intelligence, Familiarity, Instructional Design, Brainstorming
Peer reviewed Peer reviewed
Direct linkDirect link
Chrispus Zacharia Oroni; Fu Xianping; Daniela Daniel Ndunguru; Arsenyan Ani – Education and Information Technologies, 2025
In recent times, the rapid growth of e-learning has brought about increased concerns regarding cybersecurity risks within digital learning environments. Despite the growing importance of cybersecurity awareness among e-learning students, there is limited research on the factors that influence students' understanding and adherence to cyber safety…
Descriptors: Educational Technology, Electronic Learning, Information Security, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Karlo Ložnjak; Anamaria Maleševic; Marin Cargo; Anamarija Mladinic; Zvonimir Koporc; Livia Puljak – Journal of Academic Ethics, 2024
Personal data protection is an ethical issue. In this study we analyzed how research ethics committees (RECs) and data protection officers (DPOs) handle personal data protection issues in research protocols. We conducted a mixed-methods study. We included heads (or delegated representatives) of RECs and DPOs from universities and public research…
Descriptors: Research Committees, Ethics, Information Security, Foreign Countries
Bonnie B. Chelette – ProQuest LLC, 2023
K-12 schools in Louisiana face unique cybersecurity challenges due to the state's high poverty rate, resource constraints, infrastructure weaknesses, and vulnerability to natural disasters. Public school systems in Louisiana have been particularly vulnerable to these attacks, with incidents of cyberattacks tripling in 2020 alone. The Louisiana…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Barriers
Peer reviewed Peer reviewed
Direct linkDirect link
Essohanam Djeki; Jules Dégila; Muhtar Hanif Alhassan – Education and Information Technologies, 2024
COVID-19 has significantly impacted humankind's lifestyle since its emergence. Educational institutions quickly adopted online courses to deal with its spread. Regrettably, the adoption of e-learning solutions, particularly in Africa, has not given due priority to security. However, cyberattacks and cyber incidents are leaping forward. To propose…
Descriptors: Foreign Countries, COVID-19, Pandemics, Electronic Learning
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Peer reviewed Peer reviewed
Direct linkDirect link
Estel·la Ramírez-Baraldes; Daniel García-Gutiérrez; Cristina García-Salido – European Journal of Education, 2025
To explore the opportunities and challenges of artificial intelligence (AI) in nursing and its impact. Bibliographic review using Arksey and O'Malley's framework, enhanced by Levac, Colquhoun and O'Brien and following PRISMA guidelines, including qualitative and mixed studies. MeSH terms and keywords such as nursing education and ethical…
Descriptors: Artificial Intelligence, Nursing, Nursing Education, Barriers
Peer reviewed Peer reviewed
Direct linkDirect link
Ece Gumusel – Journal of Education for Library and Information Science, 2025
The rapid advancement of technology has presented marginalized communities in libraries with numerous privacy and security challenges. Many researchers have emphasized the importance of Privacy-Enhancing Technologies (PETs), suggesting that these technical solutions can effectively assist users in safeguarding their personally identifiable…
Descriptors: Privacy, LGBTQ People, College Students, Information Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – Problems of Education in the 21st Century, 2025
Without regulations for higher education institutions in the metaverse, ethical transgressions are unavoidable. Educational metaverse systems, which integrate artificial intelligence, essentially depend on big data as their core technology, leading to considerable privacy issues. Therefore, this study examines data privacy and security issues, a…
Descriptors: Higher Education, Information Security, Privacy, Artificial Intelligence
Serena Sullivan – ProQuest LLC, 2022
The complexity and frequency of online attacks have been steadily increasing; additional privacy protection and security measures are necessary for individuals to safeguard Personal Identifiable Information (PII). Challenges exist for Trinidad State College (TSC) students to improve online personal privacy protection behaviors. Protective…
Descriptors: Rural Schools, College Students, Privacy, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Annette Bamberger; Tien-Yin Huang – Journal of Education Policy, 2025
This paper analyses the EU's approach to international research cooperation between 2012-2022 drawing on critical geopolitical perspectives and the spatial politics of (re)bordering. It identifies two periods which represent the EU's shifting approaches to international research cooperation from the pursuit of a liberal agenda promoting…
Descriptors: Foreign Countries, Neoliberalism, International Cooperation, Research Administration
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zulaikha Al-Saadi; Hanan Khalil; Ahmed Mohamed Fahmy Yousef – Educational Process: International Journal, 2025
Background/purpose: This study explores the perceptions of Omani pre-service EFL teachers on promoting critical thinking through the ethical use of AI. The rationale of this study is to better understand the perceived strengths and training needs of pre-service teachers regarding the use of AI, which can improve future educational policy and…
Descriptors: Foreign Countries, Preservice Teachers, Student Attitudes, Critical Thinking
Peer reviewed Peer reviewed
Direct linkDirect link
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9