Publication Date
In 2025 | 31 |
Since 2024 | 188 |
Since 2021 (last 5 years) | 576 |
Since 2016 (last 10 years) | 1058 |
Since 2006 (last 20 years) | 1414 |
Descriptor
Information Security | 1416 |
Privacy | 485 |
Computer Security | 441 |
Foreign Countries | 348 |
Information Technology | 299 |
Internet | 215 |
Higher Education | 196 |
Computer Software | 163 |
Teaching Methods | 162 |
Technology Uses in Education | 162 |
Data Collection | 160 |
More ▼ |
Source
Author
Prinsloo, Paul | 5 |
Boninger, Faith | 4 |
Khalil, Mohammad | 4 |
Lawrence, Cameron | 4 |
Marquardson, Jim | 4 |
Martin, Florence | 4 |
Molnar, Alex | 4 |
Slade, Sharon | 4 |
Whitfield, Christina | 4 |
Celeda, Pavel | 3 |
Chen, Weiqin | 3 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 37 |
Teachers | 32 |
Administrators | 10 |
Researchers | 8 |
Parents | 6 |
Practitioners | 5 |
Students | 5 |
Media Staff | 4 |
Community | 1 |
Support Staff | 1 |
Location
United Kingdom | 33 |
Turkey | 32 |
United States | 27 |
Canada | 25 |
California | 24 |
Australia | 23 |
Texas | 23 |
China | 22 |
Florida | 22 |
European Union | 21 |
India | 18 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Wibowo Heru Prasetiyo; Beti Indah Sari; Noor Banu Mahadir Naidu; Novitasari Gemi Nurlaili – Education and Information Technologies, 2024
The pervasive presence of the internet in educational environments presents a multiplicity of challenges, particularly in fostering students' responsible and ethical digital citizenship. While existing research investigates digital citizenship, few studies have examined internet skills and computer self-efficacy as mediating factors between…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Technological Literacy
Catherine Adams; Sean Groten – Learning, Media and Technology, 2024
A TechnoEthical Framework for Teachers (TEFT) is introduced to aid educators in selecting and employing educational technologies in ethically sound and pedagogical sensitive ways in their classrooms. TEFT views technology through three key technoethical lenses or perspectives: instrumental, sociomaterial and existential. The instrumental lens is…
Descriptors: Elementary Secondary Education, Technology Uses in Education, Educational Technology, Media Selection
Aurelia Raquel Rodriguez Mandani – ProQuest LLC, 2024
In the context of the rapid expansion of web-integrated technologies, there exists a need for a thorough comprehension of data privacy, emphasizing risk mitigation and the nuanced governance of private data within organizational and regulatory frameworks. Given the rise of privacy regulations such as the GDPR and CCPA, it has become important for…
Descriptors: Information Technology, Information Security, Compliance (Psychology), Privacy
Weaver, Bradley W.; Braly, Adam M.; Lane, David M. – Journal of Educational Computing Research, 2021
Phishing emails pose a serious threat to individuals and organizations. Users' ability to identify phishing emails is critical to avoid becoming victims of these attacks. The current study examined the effectiveness of a short online phishing training program designed to help users identify phishing emails. Half of the participants were in the…
Descriptors: Identification, Deception, Electronic Mail, Training
Taha, Nashrawan; Dahabiyeh, Laila – Education and Information Technologies, 2021
The rapid technological developments associated with the decrease in the cost of smartphones made the latter more accessible and convenient to be used. In an educational setting, students are increasingly bringing their smartphones to classrooms, this could have serious security implications, particularly when students are less aware of smartphone…
Descriptors: College Students, Information Security, Knowledge Level, Comparative Analysis
Magnone, Soledad – Global Studies of Childhood, 2021
By 2015, one-third of internet users around the world were under the age of 18, almost half of which were living in the so-called 'Global South'. In light of this, literature from the field of children's online rights has become increasingly critical of the lack of engagement in internet governance discussions globally with the United Nations (UN)…
Descriptors: Foreign Countries, Childrens Rights, Children, Treaties
Desai, Roopa Ramesh; Kim, Jaehoon – Journal of Information Systems Education, 2023
The Internet of Things (IoT) has pervaded practically all aspects of our lives. In this exploratory study, we survey its applications in the field of education. It is evident that technology in general, and, in particular IoT, has been increasingly altering the educational landscape. The goal of this paper is to review the academic literature on…
Descriptors: Internet, Information Technology, Technology Uses in Education, Influence of Technology
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Badie, Nasrin; Hussin, Ab Razak Che; Yadegaridehkordi, Elaheh; Singh, Dalbir; Lashkari, Arash Habibi – Education and Information Technologies, 2023
Cloud computing is the next generation of on-demand information technology services and products that deliver various applications over the Internet. Cloud computing is often adopted as a superior alternative by data centers to replace their current system. However, cloud computing services are still accompanied by many issues which hinder their…
Descriptors: Foreign Countries, Universities, Information Management, Information Storage
Michael Klein; Zac Chase, Contributor – Office of Educational Technology, US Department of Education, 2023
This is the third in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Privacy
Shard; Devesh Kumar; Sapna Koul – International Journal of Information and Learning Technology, 2024
Purpose: This study aims to gain insights into how students perceive online examination practices and evaluation, as well as identify the key factors that impact their intentions toward online exams. Design/methodology/approach: This empirical study conducted in India utilized an online survey method between May 24 and June 14, 2022. The data were…
Descriptors: Foreign Countries, Undergraduate Students, Graduate Students, Student Attitudes
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers