NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 24 results Save | Export
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Peer reviewed Peer reviewed
Direct linkDirect link
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Ganesh Iyer – ProQuest LLC, 2021
This quantitative, cross-sectional study investigated the relationship between the concern for information privacy (CFIP) of Indian undergraduate students and their willingness to provide personal information to transact on the Internet (PPIT). The study also examined the mediating effects of internet trust and perceived internet privacy risk on…
Descriptors: Foreign Countries, Undergraduate Students, Privacy, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eyuboglu, Fatma Aycan Binay; Yilmaz, Fatma Gizem Karaoglan – Education Quarterly Reviews, 2022
Individuals may encounter many negativities due to the misuse of computers and the Internet. Children suffer the most from these negativities. This situation necessitates parents who always protect and stand by their children, to become knowledgeable about the safe use of computers and the Internet. In this study, we examined the opinions of the…
Descriptors: Parent Attitudes, Internet, Computer Uses in Education, Child Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Mary Rice; Joaquín T. Argüello de Jesús – Learning, Media and Technology, 2024
The purpose of this essay is to conceptualize accessibility in digital education for school children through a minimal computing perspective. This perspective prioritizes the contextual, social, and relational as part of the ethic of minimal computing mantra to consider "What." "We." "Need." To achieve our goals, we…
Descriptors: Rural Schools, Accessibility (for Disabled), Access to Computers, Decolonization
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Moradi Sheykhjan, Tohid – Online Submission, 2017
Our goal for this paper discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in relation to its application for educating digital citizens. In recent years we have witnessed a revolution in Information and Communication Technologies (ICTs) that has transformed every field of…
Descriptors: Internet, Online Searching, Educational Research, Social Science Research
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Baker-Eveleth, Lori; Stone, Robert W. – Journal of Academic Administration in Higher Education, 2013
The research presents an analysis of faculty opinions regarding the introduction of a new computer-based faculty activity repository (FAR) in a university setting. The qualitative study employs content analysis to better understand the phenomenon underlying these faculty opinions and to augment the findings from a quantitative study. A web-based…
Descriptors: Content Analysis, College Faculty, Teacher Attitudes, Computer Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Fang; Wang, Shudong – Turkish Online Journal of Educational Technology - TOJET, 2014
This research investigates East Asian students' perceptions towards e-learning privacy. The survey was first carried out in Japan (N1 = 255) and China (N2 = 307) in 2009. In 2012 the same survey was conducted again in these two countries but with different participants (N3 = 175, N4 = 63). To survey in different countries is to verify whether…
Descriptors: Foreign Countries, Student Attitudes, Educational Technology, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Yu, Li; Harrison, L.; Lu, Aidong; Li, Zhiwei; Wang, Weichao – IEEE Transactions on Learning Technologies, 2011
We have designed and developed a 3D digital Lego system as an education tool for teaching security protocols effectively in Information Assurance courses (Lego is a trademark of the LEGO Group. Here, we use it only to represent the pieces of a construction set.). Our approach applies the pedagogical methods learned from toy construction sets by…
Descriptors: Information Security, Teaching Methods, Feedback (Response), Toys
Alberta Education, 2013
Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…
Descriptors: Internet, Educational Technology, Computer Uses in Education, Shared Resources and Services
Association Supporting Computer Users in Education, 2017
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Computer Software, Conferences (Gatherings)
Peer reviewed Peer reviewed
Direct linkDirect link
Plesch, Christine; Kaendler, Celia; Rummel, Nikol; Wiedmann, Michael; Spada, Hans – Computers & Education, 2013
Despite steady progress in research in technology-enhanced learning (TEL), the translation of research findings and technology into educational practices falls short of expectations. We present five Areas of Tension which were identified and evaluated in an international Delphi study on TEL. These tensions might impede a more comprehensive…
Descriptors: Foreign Countries, International Education, Conflict, Educational Research
Previous Page | Next Page »
Pages: 1  |  2