NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 348 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Karlo Ložnjak; Anamaria Maleševic; Marin Cargo; Anamarija Mladinic; Zvonimir Koporc; Livia Puljak – Journal of Academic Ethics, 2024
Personal data protection is an ethical issue. In this study we analyzed how research ethics committees (RECs) and data protection officers (DPOs) handle personal data protection issues in research protocols. We conducted a mixed-methods study. We included heads (or delegated representatives) of RECs and DPOs from universities and public research…
Descriptors: Research Committees, Ethics, Information Security, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Levis Omusugu Amuya; Peterson Mwai Kariuki – Journal of Higher Education Policy and Management, 2024
Academic institutions today are experiencing a legion of security risks that are increasingly impeding their mission of producing high-quality graduates, guarding reason and educational integrity, and ultimately advancing human civilisation. The Enterprise Security Risk Management (ESRM) model represents a potential solution to the dynamic threats…
Descriptors: Foreign Countries, Universities, Risk Management, Accreditation (Institutions)
Peer reviewed Peer reviewed
Direct linkDirect link
Zeinab Mohammed; Fatma Abdelgawad; Mamoun Ahram; Maha E. Ibrahim; Alya Elgamri; Ehsan Gamel; Latifa Adarmouch; Karima El Rhazi; Samar Abd ElHafeez; Henry Silverman – Research Ethics, 2024
Members of research ethics committees (RECs) face a number of ethical challenges when reviewing genomic research. These include issues regarding the content and type of consent, the return of individual research results, mechanisms of sharing specimens and health data, and appropriate community engagement efforts. This article presents the…
Descriptors: Research, Ethics, Committees, Attitudes
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Berrin Okka – International Journal of Education in Mathematics, Science and Technology, 2024
The purpose of this study was to investigate the ethical tendencies of medical faculty students, their unethical use of information and communication technologies, and their attitudes toward digital ethics in terms of certain variables. The study was designed using a relational survey model. The research group consisted of 335 medical faculty…
Descriptors: Foreign Countries, Medical Education, Medical Students, Medical School Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Mohamed Al Hemairy; Manar Abu Talib; Ather Khalil; Ahsan Zulfiqar; Takua Mohamed – Education and Information Technologies, 2024
Academic credentials play an immensely significant role in the career of a person and in the progress of society. The system in place currently used for the issuance, storage & sharing of academic credentials is quite inefficient in its operations, due to being paper based in large. There is also widespread fraud committed every year in terms…
Descriptors: Foreign Countries, Computer Security, Information Security, Credentials
Peer reviewed Peer reviewed
Direct linkDirect link
Essohanam Djeki; Jules Dégila; Muhtar Hanif Alhassan – Education and Information Technologies, 2024
COVID-19 has significantly impacted humankind's lifestyle since its emergence. Educational institutions quickly adopted online courses to deal with its spread. Regrettably, the adoption of e-learning solutions, particularly in Africa, has not given due priority to security. However, cyberattacks and cyber incidents are leaping forward. To propose…
Descriptors: Foreign Countries, COVID-19, Pandemics, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Liangqing Li – Education and Information Technologies, 2024
The purpose of the current article is to evaluate social responsibility, digital ethics, and knowledge about safe data storage among students of different ages. Four hundred students took part in the study: 200 people each in the first and fifth years of study. Their ages were 19.2 years (SD = 1.08) and 24.4 years (SD = 1.18), respectively. The…
Descriptors: Information Security, Social Responsibility, Ethics, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Peer reviewed Peer reviewed
Direct linkDirect link
Ingrid Koni; Liina Lepp – Scandinavian Journal of Educational Research, 2024
In teacher training, it is important to support prospective teachers as they become reflective practitioners. The aim of the study was to discover what, in the opinion of student teachers, are the advantages and disadvantages of using a video diary for learning purposes compared to a written diary. A questionnaire was used to collect data from 34…
Descriptors: Foreign Countries, Preservice Teacher Education, Preservice Teachers, Student Journals
Peer reviewed Peer reviewed
Direct linkDirect link
Birgy Lorenz – Educational Media International, 2023
The proportion of women in the IT sector is decreasing. In schools, girls tend to stay away from IT or take on roles in softer activities such as digital safety, social media. Studying and working in IT requires technical skillset. At the same time, the sector would need people with people and organizational skills as well. Technical skills can be…
Descriptors: Females, Role Models, Information Technology, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Xinran Wang – European Journal of Education (EJED), 2022
The focus of this research was to look into the information security awareness of Chinese university students during the COVID-19 pandemic and make recommendations based on the survey's findings and research literature. The quantitative method is applied in this study. 111 Chinese college students were randomly sampled and requested to answer a…
Descriptors: Foreign Countries, College Students, Knowledge Level, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ondrušková, Dana; Pospíšil, Richard – Contemporary Educational Technology, 2023
The increasing use of the Internet calls upon the need for adequate cyber security awareness to better face the risk and dangers connected with the online environment. This research presents an experiment that revealed the cyber security awareness of children at Czech primary schools. They were tested for their skills to distinguish different…
Descriptors: Best Practices, Curriculum Implementation, Information Security, Elementary School Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ramlah Mailok; Haslina Hassan; Che Soh Said; Mashitoh Hashim – International Journal on Social and Education Sciences, 2023
Over recent years, the sharing of personal data among students is uncontrolled, especially on the social media networks, resulting in widespread data intrusions that compromise their privacy and confidentiality. Against this backdrop, this study was conducted to identify the level of knowledge of personal data protection among students. This…
Descriptors: Information Security, Knowledge Level, Foreign Countries, Privacy
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  24