NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 76 to 90 of 1,416 results Save | Export
Clarence Okoh – Center for Law and Social Policy, Inc. (CLASP), 2024
As the infrastructure of police surveillance grows in public schools, communities must be prepared to safeguard the rights and freedoms of students and families. This report is designed to help youth justice advocates, youth leaders, educators, caregivers, and policymakers understand and challenge the impact of school surveillance, data…
Descriptors: Youth, Artificial Intelligence, Student Rights, Disclosure
Peer reviewed Peer reviewed
Direct linkDirect link
Juliana Elisa Raffaghelli; Marc Romero Carbonell; Teresa Romeu-Fontanillas – Information and Learning Sciences, 2024
Purpose: It has been demonstrated that AI-powered, data-driven tools' usage is not universal, but deeply linked to socio-cultural contexts. The purpose of this paper is to display the need of adopting situated lenses, relating to specific personal and professional learning about data protection and privacy. Design/methodology/approach: The authors…
Descriptors: Artificial Intelligence, Data Collection, Information Literacy, Intervention
Patrick Ward – ProQuest LLC, 2024
This proposal is to develop a framework for designing a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges such as program accreditation, workforce development, and Department of Homeland Security/National Security Agency…
Descriptors: Community Colleges, College Programs, Computer Security, Internet
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Zhen Xu; Kara M. Dawson; Pavlo D. Antonenko; Do Hyong Koh; Minyoung Lee; Amber E. Benedict; Swarup Bhunia – Journal of Research on Technology in Education, 2024
This article describes the use of a comic book to anchor a cryptology and cybersecurity curriculum for upper elementary students. Perceptions about the comic book from 138 students across 11 afterschool programs were examined using survey, classroom observation, and interviews. Data analysis revealed that the comic book created a…
Descriptors: Technology, Computer Security, Information Security, Cartoons
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ondrušková, Dana; Pospíšil, Richard – Contemporary Educational Technology, 2023
The increasing use of the Internet calls upon the need for adequate cyber security awareness to better face the risk and dangers connected with the online environment. This research presents an experiment that revealed the cyber security awareness of children at Czech primary schools. They were tested for their skills to distinguish different…
Descriptors: Best Practices, Curriculum Implementation, Information Security, Elementary School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Prinsloo, Paul; Slade, Sharon; Khalil, Mohammad – British Journal of Educational Technology, 2023
Since the emergence of learning analytics (LA) in 2011 as a distinct field of research and practice, multimodal learning analytics (MMLA), shares an interdisciplinary approach to research and practice with LA in its use of technology (eg, low cost sensors, wearable technologies), the use of artificial intelligence (AI) and machine learning (ML),…
Descriptors: Multimedia Instruction, Learning Analytics, Privacy, Student Rights
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Weitl-Harms, Sherri; Spanier, Adam; Hastings, John; Rokusek, Matthew – Journal of Cybersecurity Education, Research and Practice, 2023
Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework.…
Descriptors: Gamification, Undergraduate Students, Information Security, Game Based Learning
II Patrick Michael Damon – ProQuest LLC, 2023
The purpose of this study was to examine the effects of gamified training in cybersecurity concepts on individuals not employed in information technology roles compared to traditional pieces of training. As the world becomes increasingly connected technologically, so too do the cyber vulnerabilities increase, and it is essential for all types of…
Descriptors: Information Technology, Information Security, Computer Security, Gamification
Joshua Hanna – ProQuest LLC, 2023
The rise in cyber-related attacks targeting school districts is outpacing cybersecurity readiness, as education institutions in the USA continue to fall victim to online threats (Levin, 2022). The education industry has been slow to react to an increasingly dangerous security landscape, leading many schools to become prime targets and victims of…
Descriptors: Superintendents, Administrator Attitudes, Administrator Role, Computer Security
Owusu, Samuel – ProQuest LLC, 2023
Cybersecurity job roles and responsibilities constantly evolve due to technological advancements, complex infrastructure, and increasing cybersecurity threats and regulations. As a result, organizations require a highly skilled and experienced cybersecurity workforce in both the public and private sectors. Many colleges and universities offer…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ramlah Mailok; Haslina Hassan; Che Soh Said; Mashitoh Hashim – International Journal on Social and Education Sciences, 2023
Over recent years, the sharing of personal data among students is uncontrolled, especially on the social media networks, resulting in widespread data intrusions that compromise their privacy and confidentiality. Against this backdrop, this study was conducted to identify the level of knowledge of personal data protection among students. This…
Descriptors: Information Security, Knowledge Level, Foreign Countries, Privacy
Michael Dean Barker – ProQuest LLC, 2023
The emergence of new credentials is changing the landscape of traditional post-secondary education. The tight labor market's rising demand to fill vacancies in high-demand career fields such as cybersecurity has led to so-called "alternative credentials" to rapidly upskill and reskill existing professionals to move into the industry.…
Descriptors: Postsecondary Education, Credentials, Employment Qualifications, Labor Needs
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Hao; Zhang, Yan; Zhang, Song; Lyu, Tu – Education and Information Technologies, 2023
This study examines the effect of a gamified information security education system (ISES) on developing users' information security awareness and protection behavioral intention. We developed a research model based on affordance theory and means-end chain theory. Using a scenario-based experimental survey approach, we obtained 220 valid samples…
Descriptors: Intention, Information Security, Computer Security, Correlation
Peer reviewed Peer reviewed
Direct linkDirect link
Héctor Galindo-Domínguez; María José Bezanilla; Lucía Campo – Education and Information Technologies, 2025
Although part of their use is intended for leisure, social networks could be a useful tool for developing students' critical thinking. Nevertheless, this relationship could also be influenced by our competence in learning to learn, that is to say, our knowledge, skills, and attitudes associated with self-regulation, metacognition, use of learning…
Descriptors: Social Media, College Students, Critical Thinking, Problem Solving
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  95