NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Asfour, Ali; Zain, Samer; Salleh, Norsaremah; Grundy, John – International Journal of Technology in Education and Science, 2019
Agile development methods have been proposed as a natural fit for mobile app development contexts. Despite many studies addressing the adoption of agile methods for traditional web and desktop applications, there is a lack of studies of how mobile app development teams can adopt agile methods and the challenges they are facing. Our study explores…
Descriptors: Computer Software, Case Studies, Guidance, Quality Assurance
Edwards, Keith – ProQuest LLC, 2015
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
Descriptors: Computer Security, Information Security, Decision Making, Self Efficacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Smith, Catherine L. – Information Research: An International Electronic Journal, 2016
Introduction: The analysis of detailed interaction records is fundamental to development of user-centred systems. Researchers seeking such data must recruit volunteers willing to allow tracking of their interactions. This study examines privacy and trust attitudes in the intent to volunteer for research requiring installation of tracking software.…
Descriptors: Privacy, Trust (Psychology), Data Analysis, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Cheng, Diane – Institute for College Access & Success, 2011
For students and their families, deciding whether and where to go to college is one of the most important financial decisions they will ever make. However, unlike buying a computer, house, or car, most prospective students do not know how much it will cost them to attend a particular school until many of their choices about college have already…
Descriptors: College Bound Students, College Choice, Decision Making, Student Costs
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers