NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Esra Merve Çaliskan; I?rem I?tegin – Journal of Cybersecurity Education, Research and Practice, 2024
With the development of technology, security, a core human concern throughout history, has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of…
Descriptors: Gender Differences, Computer Security, Information Security, Sex Role
Peer reviewed Peer reviewed
Direct linkDirect link
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ghosh, Swagata; Chauhan, Gajendra Singh; Kotwal, Renu – Digital Education Review, 2023
The COVID-19 pandemic has fast-tracked the development of digital applications and inspired everyone to adapt to the technologies to curb the spread of outbreak. As this crisis intensifies, the rapid usage of digital devices and apps has echoed the serious concerns about civil liberties, privacy, and data protection. Considering the situation,…
Descriptors: Foreign Countries, Youth, Digital Literacy, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jamal, Bakht; Rizvi, Syed Asad Abbas – Pakistan Journal of Distance and Online Learning, 2023
This paper intended to analyze the practices of digital citizenship among university student in Pakistan. The quantitative descriptive survey research design was adopted for this study. The population of the study was 800 students of BS (Education) program in ten public sector universities in Punjab, Pakistan. Simple random sampling technique was…
Descriptors: Foreign Countries, Technological Literacy, College Students, Computer Use
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Karagozlu, Damla – Cypriot Journal of Educational Sciences, 2020
As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study…
Descriptors: Preservice Teachers, Computer Security, Information Security, Student Behavior
Pearson, Ed, III – ProQuest LLC, 2019
This dissertation recommends research to investigate the effects inhibitory control and perceptual attention have on the cyber security decision-making process. Understanding the effects that inhibitory control and perceptual attention have on the security decision-making process will allow for better defenses to be developed against social…
Descriptors: Inhibition, Self Control, Attention, Perception
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pérez-Escoda, Ana; Lena-Acebo, Francisco Javier; García-Ruiz, Rosa – Digital Education Review, 2021
Networked society before pandemic situation had become the context of a technology-supported environment for learning and teaching. Since COVID-19 pandemic occurred learning happened essentially mediated through connected smart devices that demand digital skills and reinforced Smart learning. This study aims to present a descriptive and…
Descriptors: Foreign Countries, COVID-19, Pandemics, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gallego-Arrufat, María-Jesús; Torres-Hernández, Norma; Pessoa, Teresa – Comunicar: Media Education Research Journal, 2019
The use of technologies and the Internet poses problems and risks related to digital security. This article presents the results of a study on the evaluation of the digital competence of future teachers in the DigCompEdu European framework. 317 undergraduate students from Spain and Portugal answered a questionnaire with 59 items, validated by…
Descriptors: Teacher Competencies, Educational Technology, Technology Uses in Education, Computer Security
Yilmaz, Ramazan; Karaoglan Yilmaz, F. Gizem; Özturk, H. Tugba; Karademir, Tugra – Online Submission, 2017
Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome…
Descriptors: Foreign Countries, Secondary School Students, Computer Use, Internet
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Buchanan, Rachel; Southgate, Erica; Smith, Shamus P.; Murray, Tiana; Noble, Brittany – E-Learning and Digital Media, 2017
Given that today's children are prolific users of the internet, concern has been raised about the future impact of the digital footprints they are currently generating. Here, we report on the "Best Footprint Forward" project which utilised focus groups to investigate the digital footprint awareness of 33 children (ranging in age from 10…
Descriptors: Internet, Preadolescents, Elementary School Students, Computer Use
Reddy, Dinesh Sampangirama – ProQuest LLC, 2017
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Descriptors: Computer Security, Information Security, Information Technology, Self Efficacy
Previous Page | Next Page »
Pages: 1  |  2