Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Information Security | 7 |
Student Surveys | 7 |
College Students | 4 |
Electronic Learning | 3 |
Internet | 3 |
Privacy | 3 |
Student Attitudes | 3 |
Undergraduate Students | 3 |
College Instruction | 2 |
Comparative Analysis | 2 |
More ▼ |
Source
Educational Technology &… | 1 |
IEEE Transactions on Learning… | 1 |
Information Research: An… | 1 |
International Journal of… | 1 |
Journal of Educational… | 1 |
Journal of Information… | 1 |
Online Submission | 1 |
Author
Anwar, M. | 1 |
Chen, Li-Chiou | 1 |
Chin, Amita | 1 |
Greer, J. | 1 |
Jones, Beth | 1 |
Karademir, Tugra | 1 |
Karaoglan Yilmaz, F. Gizem | 1 |
Little, Philip | 1 |
Peltsverger, Svetlana | 1 |
Perrault, Evan K. | 1 |
Smith, Catherine L. | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 6 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Secondary Education | 1 |
Audience
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chin, Amita; Jones, Beth; Little, Philip – International Journal of Education and Development using Information and Communication Technology, 2021
This study on smartphone security behaviors and practices is a continuation of the work in Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive university were compared to results from a 2014 survey at the same institution. That study found that students continued to be lax in their mobile security practices.…
Descriptors: Telecommunications, Handheld Devices, Computer Security, Student Attitudes
Yilmaz, Ramazan; Karaoglan Yilmaz, F. Gizem; Özturk, H. Tugba; Karademir, Tugra – Online Submission, 2017
Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome…
Descriptors: Foreign Countries, Secondary School Students, Computer Use, Internet
Perrault, Evan K. – Journal of Educational Computing Research, 2018
Despite improved spam filtering technology, phishing continues to be a prevalent threat for college students. The current study found that approximately 4-in-10 of the students surveyed (N = 462) indicate they do not know what phishing is and the threat it poses. Students also report initially overestimating their confidence to successfully…
Descriptors: Online Courses, Electronic Learning, Student Attitudes, Intention
Smith, Catherine L. – Information Research: An International Electronic Journal, 2016
Introduction: The analysis of detailed interaction records is fundamental to development of user-centred systems. Researchers seeking such data must recruit volunteers willing to allow tracking of their interactions. This study examines privacy and trust attitudes in the intent to volunteer for research requiring installation of tracking software.…
Descriptors: Privacy, Trust (Psychology), Data Analysis, Information Security
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education