NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…2
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 35 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Elgharnah, Khairi Ghet Elghadafi; Ozdamli, Fezile – World Journal on Educational Technology: Current Issues, 2020
Internet security safety awareness of parents is an important issue that should be addressed to raise the knowledge and awareness level about internet risks, information privacy, personal information, safety concerns and online attacks among parents to be able to teach their children to keep safe use on the internet. This study amid to investigate…
Descriptors: Internet, Safety, Parents, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Hassan Mallam Ibrahim; Kamsuriah Ahmad; Hasimi Sallehudin – Education and Information Technologies, 2025
As the need for digital content increases almost daily, preserving this content for university libraries, especially in the least developed and developing nations, becomes a challenge, resulting in the loss of this data. Even though most of these libraries are automated and adopt one digital preservation strategy or the other, library users need…
Descriptors: Preservation, Technology Uses in Education, Research Libraries, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Raza, Syed Ali; Khan, Komal Akram – Interactive Technology and Smart Education, 2022
Purpose: Collaboration, communication, critical thinking and creativity are the most essential Cs of education. However, at present, these Cs are interlinked with technology to make it more effective and reliable. Educational technology infuses higher education, many people use it on a daily basis. Students are eager to adopt such technologies…
Descriptors: Academic Achievement, Educational Technology, Higher Education, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Jewan; Mansotra, Vibhakar; Mir, Shabir Ahmad; Parveen, Shahzada – Education and Information Technologies, 2021
Nowadays Cloud computing technology is considered pivotal for the success of any business or organisation. This technology is not just an infrastructure that is used to implement various strategies rather it makes new emerging strategies possible. However, to embrace this emerging technology, the challenges and uncertainties about the expected…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Internet
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kaban, Abdullatif – Athens Journal of Education, 2021
Do we care about the security on the internet environment the way we do in the daily life safety of our children? In order to answer this question, this study aims to reveal what kind of education is provided at school about using secure internet. In accordance with this purpose, Information Technologies and Software Course textbooks at primary…
Descriptors: Internet, Information Security, Information Technology, Textbooks
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ravendran, Saravnesvaran; Karpudewan, Mageswary; Ali, Mohd Norawi; Lay, Yoon Fah – Malaysian Online Journal of Educational Sciences, 2023
The Fourth Industrial Revolution (4IR) refers to the current rapid technological growth that fundamentally changes how humans live. 4IR is essential to improve higher education worldwide and develop crucial skills such as e-learning and innovation, information and media technology, and life and career skills. This study aims to assess the…
Descriptors: Technological Advancement, Foreign Countries, Technological Literacy, Pedagogical Content Knowledge
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Raj, Gaurav; Mahajan, Manish; Singh, Dheerendra – International Journal of Web-Based Learning and Teaching Technologies, 2020
In secure web application development, the role of web services will not continue if it is not trustworthy. Retaining customers with applications is one of the major challenges if the services are not reliable and trustworthy. This article proposes a trust evaluation and decision model where the authors have defined indirect attribute, trust,…
Descriptors: Trust (Psychology), Models, Decision Making, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Previous Page | Next Page ยป
Pages: 1  |  2  |  3