NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 151 to 165 of 1,416 results Save | Export
Jaye-Jaye Johnson – ProQuest LLC, 2024
Educational technology (EdTech) interoperability throughout cyberspace provides the financial opportunity for collecting and selling of student privacy information. The research problem addressed throughout this study is the public school district leaders' (SDLs) understanding of EdTech cyber security practices and policies (EdTechCSPP). Little is…
Descriptors: Public Schools, School Districts, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Maya Usher; Miri Barak – International Journal of STEM Education, 2024
As artificial intelligence (AI) technology rapidly advances, it becomes imperative to equip students with tools to navigate through the many intricate ethical considerations surrounding its development and use. Despite growing recognition of this necessity, the integration of AI ethics into higher education curricula remains limited. This paucity…
Descriptors: Artificial Intelligence, Ethics, Ethical Instruction, Online Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ally, Said – International Journal of Education and Development using Information and Communication Technology, 2022
Moodle software has become the heart of teaching and learning services in education. The software is viewed as a trusted modern platform for transforming learning and teaching modes from conventional face-to-face to fully online classes. However, its use for online examination is very limited despite having a state-of-the-art Quiz Module with…
Descriptors: Integrated Learning Systems, Computer Assisted Testing, Information Security, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Torres-Hernández, Norma; Gallego-Arrufat, María-Jesús – Education and Information Technologies, 2022
The goal of this review is to analyse the state of inquiry in the field of digital competence in security in initial teacher education, via indicators to assess preservice teachers' digital competence in security, in order to help find opportunities to improve their competence level. Following the parameters defined in the PRISMA declaration, the…
Descriptors: Educational Indicators, Preservice Teachers, Student Experience, Technological Literacy
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Feray Küçükbas Duman – European Journal of Education (EJED), 2022
The most practical and fastest way to access information in today's world is via the internet. Thanks to the internet, the necessary information can be reached in a short time. Nevertheless, in addition to the benefits of the internet, it can also pose risks for users. For this reason, it is important to increase the level of awareness of…
Descriptors: Undergraduate Students, Physical Education, Student Behavior, Internet
Claus von Zastrow; Zeke Perez – Education Commission of the States, 2022
Advances in state education data systems are helping schools understand and meet the needs of learners from early education through college and the workforce. Each state has adhered to key principles for protecting student data privacy. In the report "Lessons in Data Privacy for Education Leaders. Policy Guide," (ED625423) leading…
Descriptors: Privacy, Data, Information Security, State Departments of Education
Privacy Technical Assistance Center, 2021
This resource aims to provide parents of K-12 students information to help understand what it means when your school has a data breach, as well as provide tools and best practices to help navigate the sometimes confusing process of protecting your children's data in the event of a breach.
Descriptors: Student Records, Information Security, Prevention, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Vallée, Etienne; Hsu, Yu-Chang – TechTrends: Linking Research and Practice to Improve Learning, 2023
The adoption by the African Union of its Convention on Cyber Security and Personal Data Protection in 2014 represented a step forward to protect personal data and to ensure that data remain private and secure. This is especially important for students, who often have no autonomy in the educational technology they use. Students cannot choose why…
Descriptors: Privacy, Information Security, Data Collection, Student Records
Peer reviewed Peer reviewed
Direct linkDirect link
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Silva-Robles, Rigoberto; Dutton-Treviño, Harold Sidney – Teaching Public Administration, 2023
The purpose of this work is to provide empirical evidence as to how state level Freedom of Information or Access to Information and data protection regulator bodies in Mexico carry out their training tasks. We use different theoretical assumptions, particularly those that refer to the idea of "training in the public sector" regarding two…
Descriptors: Foreign Countries, Access to Information, Information Security, Public Administration Education
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nur Suhaili Mansor; Hapini Awang; Ramlan Mustapha; Nurul Izzah Mohamad Ghozali – Online Submission, 2023
This study explores the current understanding of data security among students within the Malaysian higher education system. The focus is on evaluating how well the respondents grasp two critical aspects: knowledge related to securing social media platforms and a broader comprehension of data security measures. To gather insights, a meticulously…
Descriptors: College Students, Foreign Countries, Social Media, Information Security
Pages: 1  |  ...  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  ...  |  95