NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 299 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Aimei Yang – Journalism and Mass Communication Educator, 2025
At the forefront of industries profoundly influenced by artificial intelligence (AI), public relations (PRs) are undergoing a transformative revolution. The increasing applications of AI in PRs are driving a demand for proficient practitioners. Recognizing this, PR educational institutions must adapt by delivering tailored AI education. Despite…
Descriptors: Artificial Intelligence, Public Relations, Programming, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Monica Tatasciore; Luke Strickland; Shayne Loft – Cognitive Research: Principles and Implications, 2024
Increased automation transparency can improve the accuracy of automation use but can lead to increased bias towards agreeing with advice. Information about the automation's confidence in its advice may also increase the predictability of automation errors. We examined the effects of providing automation transparency, automation confidence…
Descriptors: Automation, Access to Information, Information Technology, Bias
Peer reviewed Peer reviewed
Direct linkDirect link
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Berrin Okka – International Journal of Education in Mathematics, Science and Technology, 2024
The purpose of this study was to investigate the ethical tendencies of medical faculty students, their unethical use of information and communication technologies, and their attitudes toward digital ethics in terms of certain variables. The study was designed using a relational survey model. The research group consisted of 335 medical faculty…
Descriptors: Foreign Countries, Medical Education, Medical Students, Medical School Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Mohamed Al Hemairy; Manar Abu Talib; Ather Khalil; Ahsan Zulfiqar; Takua Mohamed – Education and Information Technologies, 2024
Academic credentials play an immensely significant role in the career of a person and in the progress of society. The system in place currently used for the issuance, storage & sharing of academic credentials is quite inefficient in its operations, due to being paper based in large. There is also widespread fraud committed every year in terms…
Descriptors: Foreign Countries, Computer Security, Information Security, Credentials
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Birgy Lorenz – Educational Media International, 2023
The proportion of women in the IT sector is decreasing. In schools, girls tend to stay away from IT or take on roles in softer activities such as digital safety, social media. Studying and working in IT requires technical skillset. At the same time, the sector would need people with people and organizational skills as well. Technical skills can be…
Descriptors: Females, Role Models, Information Technology, Foreign Countries
Ali Nusair – ProQuest LLC, 2023
As the digital revolution unfolds, individuals are increasingly transforming their traditional homes into smart homes, adopting semi- and fully automated smart devices. This transformative shift, fueled by advancements in information technology, presents vast social and economic opportunities. Despite the burgeoning number of smart devices in the…
Descriptors: Internet, Information Technology, Information Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Garg, Anuj; A., Sharmila; Kumar, Pramod; Madhukar, Mani; Loyola-González, Octavio; Kumar, Manoj – Education and Information Technologies, 2022
Nowadays, internet technology plays a vital role in all the fields of our daily lives ranging from the world economy, professional careers, higher education, and almost all the spheres that are deeply impacted. In the current situation, due to COVID-19, the dependence on the Internet for almost everything, including learning, getting daily needs,…
Descriptors: Internet, Electronic Learning, Online Courses, Educational Quality
Peer reviewed Peer reviewed
Direct linkDirect link
Labaran Isiaku; Ahmet Adalier – On the Horizon, 2025
Purpose: This study aims to investigate the challenges associated with the integration and implementation of blockchain technology in the education sector. The primary objective is to identify and categorize these challenges using the Technology-Organization-Environment (TOE) framework, shedding light on the technological, organizational and…
Descriptors: Literature Reviews, Technology Uses in Education, Information Security, Information Technology
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  20