Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 5 |
Internet | 5 |
Learning Activities | 5 |
Privacy | 3 |
Teaching Methods | 3 |
Barriers | 2 |
Computer Science | 2 |
Computer Software | 2 |
Electronic Learning | 2 |
Equipment | 2 |
Foreign Countries | 2 |
More ▼ |
Source
Informatics in Education | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Mathematics Teacher | 1 |
School Libraries in Canada | 1 |
Author
Abasi-amefon O. Affia | 1 |
Alexander Nolte | 1 |
Bachman, Dale J. | 1 |
Berutu, Nurmala | 1 |
Brown, Ezra A. | 1 |
Delita, Fitra | 1 |
Norton, Anderson H. | 1 |
Raimundas Matulevicius | 1 |
Sidauruk, Tumiar | 1 |
Suciani, Ayu | 1 |
Yenny, Novida | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Tests/Questionnaires | 1 |
Education Level
Elementary Secondary Education | 1 |
High Schools | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Sidauruk, Tumiar; Delita, Fitra; Berutu, Nurmala; Yenny, Novida; Suciani, Ayu – International Journal of Technology in Education and Science, 2022
Technology needs to be integrated with every learning process. Moreover, the COVID-19 pandemic situation does not allow face-to-face learning in class. Therefore, online education has become the primary choice. However, online learning itself comes with challenges from the perspective of the teachers and their students. This study aims to analyze…
Descriptors: Program Implementation, Barriers, Electronic Learning, Technology Integration
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet

School Libraries in Canada, 2000
Presents a teaching unit from the Media Awareness Network Web site that introduces students (grades six through nine) to ways in which commercial Web sites collect personal information from children and issues surrounding children and privacy on the Internet. Highlights: objective; learning outcomes; preparation and materials; the lesson; guided…
Descriptors: Child Safety, Children, Class Activities, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers