Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 11 |
Since 2006 (last 20 years) | 16 |
Descriptor
Information Security | 16 |
Internet | 16 |
Telecommunications | 16 |
Handheld Devices | 12 |
Computer Security | 8 |
Information Technology | 5 |
Privacy | 5 |
Technology Uses in Education | 5 |
Computer Software | 4 |
Crime | 4 |
Foreign Countries | 4 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 6 |
Reports - Research | 6 |
Dissertations/Theses -… | 5 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 2 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Australia | 1 |
Bulgaria | 1 |
California | 1 |
Canada | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
Cyprus | 1 |
India | 1 |
Massachusetts | 1 |
Michigan | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Desai, Roopa Ramesh; Kim, Jaehoon – Journal of Information Systems Education, 2023
The Internet of Things (IoT) has pervaded practically all aspects of our lives. In this exploratory study, we survey its applications in the field of education. It is evident that technology in general, and, in particular IoT, has been increasingly altering the educational landscape. The goal of this paper is to review the academic literature on…
Descriptors: Internet, Information Technology, Technology Uses in Education, Influence of Technology
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Wright, Brian S. – ProQuest LLC, 2017
Through the Internet of Things (IoT) people and devices are communicating and interacting with one another continuously. This includes devices such as thermostats, televisions, voice activated speakers (Amazon Echo), smartphones, tablets, and wearables (Fitbit). This is accomplished through the IoT using uniquely identifiable radio tags, sensors,…
Descriptors: Internet, Equipment, Telecommunications, Handheld Devices
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Nawaila, Muhammad Bello; Kanbul, Sezer; Mustapha, Saleh Waziri – Journal of Learning and Teaching in Digital Age, 2019
Young adulthood is an important development time period for humans where majority of them spend most of their time with technology. Which constitute all the millennials of whom are digital natives. Most of the people in this category pride themselves as tech-savvy and are so immersed in technology to the extent that drawing a boundary between…
Descriptors: Media Literacy, Risk, Undergraduate Students, Foreign Countries
Gökçe, Kevser Gülnur; Dogerlioglu, Ozgur – Knowledge Management & E-Learning, 2019
Bring Your Own Device (BYOD) policy, which allows employees to use their own mobile devices for work and connection to their corporate network, is getting popular in enterprises. While companies want to improve the efficiency and productivity of employees, employees prefer to use their own devices at work, which make them feel more comfortable and…
Descriptors: Handheld Devices, Internet, Computer Security, Administrators
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Tosun, Nilgün – Journal of Education and Training Studies, 2018
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Social Media
Milenkova, Valentina; Manov, Boris – International Association for Development of the Information Society, 2019
The present article aims to show the emergence of digital technologies in university education as a way for the formation of digital literacy in the contemporary knowledge society. The article analyzes the changes, which occur in university education creating prerequisites for mobile learning. Special attention paid to distance learning, where…
Descriptors: Educational Technology, Technology Uses in Education, Technological Literacy, Higher Education
Bele, Julija Lapuh; Dimc, Maja; Rozman, David; Jemec, Andreja Sladoje – International Association for Development of the Information Society, 2014
The widespread use of mobile devices that enable Internet access increases the exposure of both individuals and organizations to cybercrime. This article addresses the issue of strategic prevention of cybercrime with the key focus on the measures to prevent cybercrime related to children and teenagers. The primary tool for such prevention is…
Descriptors: Consciousness Raising, Internet, Crime, Information Security
Piotrowski, Chris – Online Submission, 2013
Research on the topic of cell phones has proliferated over the past decade. Based on a review of the literature, it appears that the majority of the extant research on the topic resides in the technology, education, and social sciences fields. Recent reviews indicate that the scope of the research on cell/mobile phones is eclectic in nature…
Descriptors: Information Security, Business Education, Electronic Learning, Content Analysis
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
California Community Colleges, Chancellor's Office, 2014
This 16th annual report highlights up-to-date information on the programs supported through the Chancellor's Office Telecommunications and Technology Infrastructure Program (TTIP). To summarize 2012-13, one would describe it as a year of planning and preparation. The system-wide budget cuts of the past few years, reports of impacted classes, staff…
Descriptors: Community Colleges, Telecommunications, Technology Integration, Technology Uses in Education
Lum, Lydia – CURRENTS, 2012
At the end of 2010, for the first time ever, smartphones outsold PCs. Mobile device adoption rates continue to rise rapidly around the world. A recent forecast by Cisco found that global mobile data traffic more than doubled last year, and by the end of 2012, the number of mobile devices in use will outnumber the world's population. In the United…
Descriptors: Foreign Countries, Higher Education, Community Colleges, Institutional Advancement
Previous Page | Next Page »
Pages: 1 | 2