Publication Date
In 2025 | 31 |
Since 2024 | 188 |
Since 2021 (last 5 years) | 576 |
Since 2016 (last 10 years) | 1058 |
Since 2006 (last 20 years) | 1414 |
Descriptor
Information Security | 1416 |
Privacy | 485 |
Computer Security | 441 |
Foreign Countries | 348 |
Information Technology | 299 |
Internet | 215 |
Higher Education | 196 |
Computer Software | 163 |
Teaching Methods | 162 |
Technology Uses in Education | 162 |
Data Collection | 160 |
More ▼ |
Source
Author
Prinsloo, Paul | 5 |
Boninger, Faith | 4 |
Khalil, Mohammad | 4 |
Lawrence, Cameron | 4 |
Marquardson, Jim | 4 |
Martin, Florence | 4 |
Molnar, Alex | 4 |
Slade, Sharon | 4 |
Whitfield, Christina | 4 |
Celeda, Pavel | 3 |
Chen, Weiqin | 3 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 37 |
Teachers | 32 |
Administrators | 10 |
Researchers | 8 |
Parents | 6 |
Practitioners | 5 |
Students | 5 |
Media Staff | 4 |
Community | 1 |
Support Staff | 1 |
Location
United Kingdom | 33 |
Turkey | 32 |
United States | 27 |
Canada | 25 |
California | 24 |
Australia | 23 |
Texas | 23 |
China | 22 |
Florida | 22 |
European Union | 21 |
India | 18 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Kraus, Lydia – Education and Information Technologies, 2022
Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating…
Descriptors: Data Use, Learning Analytics, Information Security, Training
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
JoEllen Renee Price – ProQuest LLC, 2022
This dissertation is aimed at assisting higher education leaders, IT professionals, and administrators in understanding data security risks that institutions face and how employee understanding and behavior can increase or reduce data security risk. The study aims to measure the relationship between financial aid administrator data security…
Descriptors: Information Security, Information Technology, Student Records, Higher Education
John Y. H. Bai; Olaf Zawacki-Richter; Wolfgang Muskens – Turkish Online Journal of Distance Education, 2024
Artificial intelligence in education (AIEd) is a fast-growing field of research. In previous work, we described efforts to explore the possible futures of AIEd by identifying key variables and their future prospects. This paper re-examines our discussions on the governance of data and the role of students and teachers by considering the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Natural Language Processing, Governance
Pablo Rivera-Vargas; Diego Calderón-Garrido; Judith Jacovkis; Lluís Parcerisa – Journal of New Approaches in Educational Research, 2024
The use of commercial digital platforms in public schools like Google and Microsoft, which was exacerbated during the pandemic, requires analysis to encourage a safer and more appropriate educational use. The research objective behind this article was to analyse the concerns of school students in obligatory primary and secondary education in…
Descriptors: Public Schools, Computer Oriented Programs, Elementary Secondary Education, Foreign Countries
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Eric Yang; Cheryl Beil – New Directions for Higher Education, 2024
Artificial intelligence (AI) and machine learning (ML) have transformed the landscape of data management in higher education institutions, necessitating a critical evaluation of existing data privacy policies and practices. This research delves into the inadequacies of current frameworks in adapting to the swift evolution of Big Data. Student,…
Descriptors: Artificial Intelligence, Teacher Attitudes, Student Attitudes, College Students
Martin Hermida; Raffael Meier; Iwan Schrackmann; Nina Imlig-Iten; Eva Marinus – Journal of Media Literacy Education, 2024
Safeguarding personal digital data is crucial and requires appropriate training. However, privacy remains a novel topic, leaving teachers with limited guidance. This study investigates how elementary school students perceive personal data and assesses pre-service teachers' accuracy in predicting children's responses. Employing Nissenbaum's…
Descriptors: Student Records, Elementary School Students, Sharing Behavior, Privacy
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Emma Day; Kruakae Pothong; Ayça Atabey; Sonia Livingstone – Learning, Media and Technology, 2024
A socio-legal analysis of the UK governance regime for data collected from children at school for teaching and learning contrasts the government-mandated data collection by schools to inform educational policy and planning with data processed and shared with third parties by commercial EdTech providers. We find the former is effectively governed…
Descriptors: Foreign Countries, Data Collection, Information Security, Student Records
Anna Filighera; Sebastian Ochs; Tim Steuer; Thomas Tregel – International Journal of Artificial Intelligence in Education, 2024
Automatic grading models are valued for the time and effort saved during the instruction of large student bodies. Especially with the increasing digitization of education and interest in large-scale standardized testing, the popularity of automatic grading has risen to the point where commercial solutions are widely available and used. However,…
Descriptors: Cheating, Grading, Form Classes (Languages), Computer Software
Jane Henriksen-Bulmer; Emily Rosenorn-Lanng; Stevie Corbin-Clarke; Samuel Ware; Davide Melacca; Lee-Ann Fenge – Interactive Learning Environments, 2024
Game-based learning can be a useful tool for increasing engagement in topics that are typically not related to games such as privacy and staying safe online, yet, very few games exist that look at how we can passively teach audiences how to stay safe online. This paper presents a bespoke board game about privacy, aimed at young people aged 16-25…
Descriptors: Game Based Learning, Teaching Methods, Privacy, Safety
Md Alimul Haque; Shameemul Haque; Sana Zeba; Kailash Kumar; Sultan Ahmad; Moidur Rahman; Senapathy Marisennayya; Laiq Ahmed – E-Learning and Digital Media, 2024
E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinence in the distance education system. Due to COVID-19, the online learning education system has become very popular. Most probably, all education systems have been using the IoT-based E-Learning system to continue the students' education without…
Descriptors: Electronic Learning, Internet, Information Networks, Technology Uses in Education
Frank Stinar; Zihan Xiong; Nigel Bosch – Journal of Educational Data Mining, 2024
Educational data mining has allowed for large improvements in educational outcomes and understanding of educational processes. However, there remains a constant tension between educational data mining advances and protecting student privacy while using educational datasets. Publicly available datasets have facilitated numerous research projects…
Descriptors: Foreign Countries, College Students, Secondary School Students, Data Collection
Emilio J. Del Riego – ProQuest LLC, 2024
This qualitative descriptive research study was conducted to explore the impact that transformational leadership and innovation have in creating a cybersecurity conscious organizational culture. The value of having a cybersecurity conscious organizational culture through transformational leadership and innovation is described in line with higher…
Descriptors: Transformational Leadership, Information Security, Computer Security, Organizational Culture