Publication Date
In 2025 | 31 |
Since 2024 | 188 |
Since 2021 (last 5 years) | 576 |
Since 2016 (last 10 years) | 1058 |
Since 2006 (last 20 years) | 1414 |
Descriptor
Information Security | 1416 |
Privacy | 485 |
Computer Security | 441 |
Foreign Countries | 348 |
Information Technology | 299 |
Internet | 215 |
Higher Education | 196 |
Computer Software | 163 |
Teaching Methods | 162 |
Technology Uses in Education | 162 |
Data Collection | 160 |
More ▼ |
Source
Author
Prinsloo, Paul | 5 |
Boninger, Faith | 4 |
Khalil, Mohammad | 4 |
Lawrence, Cameron | 4 |
Marquardson, Jim | 4 |
Martin, Florence | 4 |
Molnar, Alex | 4 |
Slade, Sharon | 4 |
Whitfield, Christina | 4 |
Celeda, Pavel | 3 |
Chen, Weiqin | 3 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 37 |
Teachers | 32 |
Administrators | 10 |
Researchers | 8 |
Parents | 6 |
Practitioners | 5 |
Students | 5 |
Media Staff | 4 |
Community | 1 |
Support Staff | 1 |
Location
United Kingdom | 33 |
Turkey | 32 |
United States | 27 |
Canada | 25 |
California | 24 |
Australia | 23 |
Texas | 23 |
China | 22 |
Florida | 22 |
European Union | 21 |
India | 18 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ali, Mazurina Mohd; Zaharon, Nur Farhana Mohd – International Journal of Educational Reform, 2024
Internet users are becoming ignorant with their data and the transparency of information due to the nature of high-speed internet today. Regrettably, internet users are deceived by engineering tactics performed by highly trained people, namely cybercriminals. Thus, in order to combat phishing attacks, internet users should be educated on security…
Descriptors: Information Security, Governance, Data, Literature Reviews
Kevin Dennis – ProQuest LLC, 2024
The first step to improving an organization's security posture is to define the organization's security goals. At a technical level, these goals are expressed as security policies. Security policies are predicates over programs, that return true or false if the program adheres to the policy. Defining these policies correctly is thus essential to…
Descriptors: Information Security, Computer Security, Policy, Integrity
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Leon Katcharian – ProQuest LLC, 2023
Remotely proctored online examinations proliferate in academic and corporate learning environments (Grajek, 2020). Remote (virtual) proctoring allows organizations to efficiently offer tests globally while reducing the costs of proctored testing generally associated with traditional paper-and-pencil and computer-based testing center examinations.…
Descriptors: Computer Assisted Testing, Supervision, Distance Education, Information Security
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Aimei Yang – Journalism and Mass Communication Educator, 2025
At the forefront of industries profoundly influenced by artificial intelligence (AI), public relations (PRs) are undergoing a transformative revolution. The increasing applications of AI in PRs are driving a demand for proficient practitioners. Recognizing this, PR educational institutions must adapt by delivering tailored AI education. Despite…
Descriptors: Artificial Intelligence, Public Relations, Programming, Coding
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Elif Ozturk – Journal of Education in Science, Environment and Health, 2025
This study examines the pedagogical, ethical, and political dimensions of artificial intelligence (AI) in early childhood STEM education from a theoretical perspective. As digital technologies become increasingly prevalent in education, AI applications offer significant opportunities in areas such as personalized learning experiences, game-based…
Descriptors: Early Childhood Education, STEM Education, Artificial Intelligence, Game Based Learning
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Lynn Rosalina Gama Alves; William de Souza Santos – Information and Learning Sciences, 2024
Purpose: This study aims to analyze the platforming scenario at a Brazilian university as well as the data security process for students and professors. Design/methodology/approach: This research brings an analysis through a qualitative approach of the platformization process in a Brazilian teaching institution. Findings: The results point to a…
Descriptors: Foreign Countries, Universities, Data, Information Security
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Liu, Qinyi; Khalil, Mohammad – British Journal of Educational Technology, 2023
The field of learning analytics has advanced from infancy stages into a more practical domain, where tangible solutions are being implemented. Nevertheless, the field has encountered numerous privacy and data protection issues that have garnered significant and growing attention. In this systematic review, four databases were searched concerning…
Descriptors: Privacy, Data, Information Security, Learning Analytics