NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 121 to 135 of 1,416 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lisa Bosman; Taofeek Oladepo; Ida Ngambeki – Journal of Research in Innovative Teaching & Learning, 2024
Purpose: Upon graduating from university, many engineers will work in new product development and/or technology adoption for continuous improvement and production optimization. These jobs require employees to be cognizant of ethical practices and implications for design. However, little engineering coursework, outside the traditional ABET…
Descriptors: Engineering Education, Ethics, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Francisco D. Guillén-Gámez; Inmaculada Martínez-García; Enrique Alastor; Lukasz Tomczyk – Computers in the Schools, 2024
The authors have developed a psychometric instrument with the purpose of assessing the digital competencies of teachers in aspects of cybersecurity. From the collection of data, different secondary objectives were carried out: (1) identify if there were significant differences regarding gender; (2) understand if there are significant differences…
Descriptors: Preservice Teachers, Technological Literacy, Internet, Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Leo Van Audenhove; Lotte Vermeire; Wendy Van den Broeck; Andy Demeulenaere – Information and Learning Sciences, 2024
Purpose: The purpose of this paper is to analyse data literacy in the new Digital Competence Framework for Citizens (DigComp 2.2). Mid-2022 the Joint Research Centre of the European Commission published a new version of the DigComp (EC, 2022). This new version focusses more on the datafication of society and emerging technologies, such as…
Descriptors: Data Analysis, Data Collection, Information Literacy, Foreign Countries
Bodnar, Richard Carl – ProQuest LLC, 2021
Evidence suggests that adherence to information security policies is one of the best and most cost-effective ways to protect an organization. Much of the current research suggests that user behavior is often to blame for vulnerabilities being exploited. Employees that have a high level of information security awareness appear to perform well…
Descriptors: Information Security, Compliance (Legal), Higher Education, Measures (Individuals)
Peer reviewed Peer reviewed
Direct linkDirect link
Annette Bamberger; Tien-Yin Huang – Journal of Education Policy, 2025
This paper analyses the EU's approach to international research cooperation between 2012-2022 drawing on critical geopolitical perspectives and the spatial politics of (re)bordering. It identifies two periods which represent the EU's shifting approaches to international research cooperation from the pursuit of a liberal agenda promoting…
Descriptors: Foreign Countries, Neoliberalism, International Cooperation, Research Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Torres-Hernández, Norma; Gallego-Arrufat, María-Jesús – Contemporary Educational Technology, 2023
The protection of personal data and privacy are important issues closely related to use of social media, information and communication technologies, and the Internet in the area of education. The treatment of academic information and use of tools and programs for instruction, communication, and learning have revealed the handling of a significant…
Descriptors: Preservice Teachers, Information Security, Elementary Education, Teacher Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Haque, Mustafizul; Kumar, V. Vijaya; Singh, Preeti; Goyal, Adheer A.; Upreti, Kamal; Verma, Ankit – Education and Information Technologies, 2023
Now a days with the rapidly increasing development of technology and communication system, the implementation of blockchain is continuously increasing in various sectors. With the increase in massive data in educational sectors there arise a requirement of handling such enormous data. This can be easily and securely handled by blockchain…
Descriptors: Meta Analysis, Information Technology, Technology Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Gümüs, Muhammed Murat; Çakir, Recep; Korkmaz, Özgen – Education and Information Technologies, 2023
Today, with digital technologies being in every aspect of our lives, cyberbullying and digital ethics, and digital security violations are emerging as concepts that threaten our digital world. It is thought that displaying ethical behavior and providing digital security in digital environments can increase sensitivity to cyberbullying. Here, it is…
Descriptors: Preservice Teachers, Bullying, Computer Mediated Communication, Ethics
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Samantha Fu; Charles Davis; Jesse Rothstein; Aparna Ramesh; Evan White – Grantee Submission, 2022
Linking data together can be a powerful way for governments and researchers alike to tackle vexing public policy research problems. However, for researchers, finding ways to link data directly between two departments can often be more challenging than even obtaining the data in the first place. Even when a researcher develops the necessary…
Descriptors: Data Use, Research Methodology, Researchers, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Yuyu Chen; Yuntao Zou – European Journal of Education, 2024
This research paper focuses on the adoption of multi-perspective theory to study teachers' attitudes and intentions towards using intelligent mixed reality (MR) devices for classroom behaviour analysis. The research model integrates TRI (Technology Readiness Index), IDT (Innovation Diffusion Theory), ECM (Expectation Confirmation Theory) and TAM…
Descriptors: Teacher Attitudes, Educational Quality, Intention, Artificial Intelligence
Indiana Department of Education, 2024
The 2024-2025 Indiana Assessments Policy Manual communicates established guidelines regarding appropriate test administration in Indiana for key stakeholders including educators and Test Coordinators. This document contains policy guidance and appendices that delineate specific aspects of test implementation, including test security protocol,…
Descriptors: Testing, Guidelines, Educational Policy, Standardized Tests
Peer reviewed Peer reviewed
PDF on ERIC Download full text
David B. Warner; Lisa McKee – Journal of Cybersecurity Education, Research and Practice, 2024
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity…
Descriptors: Information Security, Privacy, Governance, Compliance (Legal)
Pages: 1  |  ...  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  ...  |  95