NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Health Insurance Portability…1
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 23 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Berrin Okka – International Journal of Education in Mathematics, Science and Technology, 2024
The purpose of this study was to investigate the ethical tendencies of medical faculty students, their unethical use of information and communication technologies, and their attitudes toward digital ethics in terms of certain variables. The study was designed using a relational survey model. The research group consisted of 335 medical faculty…
Descriptors: Foreign Countries, Medical Education, Medical Students, Medical School Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Kwun Hung Li; Dickson K.W. Chiu; Elaine W.S. Kong; Kevin K.W. Ho – Education & Training, 2025
Purpose: This research investigates mobile security awareness among university students in Hong Kong, who increasingly rely on mobile devices for their daily activities and academic needs. This research seeks to inform targeted educational strategies and policies to enhance mobile security practices among young adults, particularly in regions…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Desai, Roopa Ramesh; Kim, Jaehoon – Journal of Information Systems Education, 2023
The Internet of Things (IoT) has pervaded practically all aspects of our lives. In this exploratory study, we survey its applications in the field of education. It is evident that technology in general, and, in particular IoT, has been increasingly altering the educational landscape. The goal of this paper is to review the academic literature on…
Descriptors: Internet, Information Technology, Technology Uses in Education, Influence of Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mite Setiansah; Nuryanti Nuryanti; Edi Santoso; Agus Ganjar Runtiko; Wiwik Novianti – Journal of Media Literacy Education, 2023
Digital literacy education is essential for everyone, including seniors to sustain their quality of life. The Digital Academy for Seniors aims to instill digital skills among seniors through a non-formal learning program. This qualitative research aimed to provide a comprehensive description of how the program can develop digital resilience and…
Descriptors: Foreign Countries, Older Adults, Technological Literacy, Quality of Life
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2018
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in…
Descriptors: Undergraduate Students, Business Schools, Information Technology, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Cutts, Haywood – ProQuest LLC, 2017
Concerns related to the protection of personal identification information, graphic user interface, patient privacy, and consumer acceptance, to name a few, have plagued the implementation of telemedicine. Advocates of telemedicine have gained the interests of consumers but failed to recognize the true nature of consumer attitudes towards the use…
Descriptors: Consumer Economics, Intention, Telecommunications, Medicine
Peer reviewed Peer reviewed
Direct linkDirect link
Lupton, Deborah – Sport, Education and Society, 2020
Digital technologies such as websites, online discussion forums, social media, content-sharing platforms, mobile apps and wearable devices are now available as a means for young people to learn about and promote their health, physical fitness and wellbeing. This article provides findings from a qualitative interview-based study of young…
Descriptors: Foreign Countries, Health Behavior, Physical Fitness, Information Sources
DeShield, Leslie A. – ProQuest LLC, 2017
Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers.…
Descriptors: Program Implementation, Technology Uses in Education, Handheld Devices, Telecommunications
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Backherms, Dennis A. – ProQuest LLC, 2017
Information technology has become increasingly necessary for competition in the 21st century. The medical industry has taken on a more comprehensive approach by creating and adopting different types of electronic medical records (EMR). Laws and regulations, such as the Health Insurance Portability and Accountability Act (HIPAA) or the Meaningful…
Descriptors: Records (Forms), Information Technology, Physicians, Telecommunications
Shelton, Martin L. – ProQuest LLC, 2015
Digital technologies have fundamentally altered how journalists communicate with their sources, enabling them to exchange information through social media as well as video, audio, and text chat. Simultaneously, journalists are increasingly concerned with corporate and government surveillance as a threat to their ability to speak with sources in…
Descriptors: Information Technology, Interviews, Journalism, Information Sources
Previous Page | Next Page »
Pages: 1  |  2