Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 18 |
Since 2006 (last 20 years) | 22 |
Descriptor
Information Security | 22 |
Privacy | 22 |
Program Effectiveness | 22 |
Computer Security | 9 |
Federal Legislation | 7 |
Barriers | 5 |
Computer Mediated… | 4 |
Computer Software | 4 |
Educational Legislation | 4 |
Foreign Countries | 4 |
Program Evaluation | 4 |
More ▼ |
Source
Author
Kingsley, Chris | 2 |
Adorjan, Michael | 1 |
Ankur Chattopadhyay | 1 |
Anwar, M. | 1 |
Bloomer, Fiona | 1 |
Borowczak, Mike | 1 |
Brown, Brandon R. | 1 |
Burrows, Andrea Carneal | 1 |
Bussey, Karen | 1 |
Cooley, Rafer | 1 |
Cristina García-Salido | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Research | 10 |
Reports - Descriptive | 6 |
Dissertations/Theses -… | 4 |
Tests/Questionnaires | 2 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Education Level
Postsecondary Education | 5 |
Higher Education | 4 |
Junior High Schools | 3 |
Middle Schools | 3 |
Secondary Education | 3 |
Elementary Education | 2 |
High Schools | 2 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Audience
Policymakers | 2 |
Location
California | 2 |
North Carolina | 2 |
Australia | 1 |
Canada | 1 |
Georgia | 1 |
Ireland | 1 |
Nigeria | 1 |
Ohio | 1 |
Oregon | 1 |
United Kingdom (Northern… | 1 |
Virginia | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Higher Education Act 1980 | 1 |
Race to the Top | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Estel·la Ramírez-Baraldes; Daniel García-Gutiérrez; Cristina García-Salido – European Journal of Education, 2025
To explore the opportunities and challenges of artificial intelligence (AI) in nursing and its impact. Bibliographic review using Arksey and O'Malley's framework, enhanced by Levac, Colquhoun and O'Brien and following PRISMA guidelines, including qualitative and mixed studies. MeSH terms and keywords such as nursing education and ethical…
Descriptors: Artificial Intelligence, Nursing, Nursing Education, Barriers
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Florence Martin; Doreen Mushi; Siyu Long; Julie Bacak; Drew Polly; Weichao Wang; Lynn Ahlgrim-Delzell – Journal of Technology and Teacher Education, 2024
Digital safety involves protecting oneself, and one's personal information to mitigate the risks that are inherently associated with using digital technologies. This study employed a multi-method design to explore 26 inservice and preservice elementary teacher experiences from attending a professional development on digital safety and facilitating…
Descriptors: Safety, Preservice Teachers, Elementary School Teachers, Summer Programs
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Jeremy Roschelle; Judi Fusco; Pati Ruiz – Digital Promise, 2024
As Artificial Intelligence within education becomes increasingly important, Digital Promise reviewed the guidance documents released by seven states--California, North Carolina, Ohio, Oregon, Virginia, Washington state, and West Virginia--on how to approach artificial intelligence (AI) in education. Throughout this report the authors summarize the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Employment Qualifications, Responsibility
MacNamara, Noirin; Mackle, Danielle; Trew, Johanne Devlin; Pierson, Claire; Bloomer, Fiona – International Journal of Social Research Methodology, 2021
Internet-mediated focus groups (FGs) have become a feature of qualitative research over the last decade; however, their use within social sciences has been adopted at a slower pace than other disciplines. This paper considers the advantages and disadvantages of internet-mediated FGs and reflects on their use for researching culturally sensitive…
Descriptors: Internet, Focus Groups, Program Effectiveness, Asynchronous Communication
Wilkerson, David A.; Wolfe-Taylor, Samantha N.; Kinney, M. Killian – Journal of Social Work Education, 2021
Student technology uncertainty was investigated in an introductory e-Social Work (e-SW) practice course. e-SW practice includes technology-mediated advocacy, research, and services delivery. A convergent parallel mixed methods design included pre- and post-test e-SW self-efficacy surveys and student reflections. There were significant measurable…
Descriptors: Introductory Courses, Online Courses, Social Work, Graduate Students
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Leventoff, Jenna – National Skills Coalition, 2019
This report urges states to participate in the State Wage Interchange System (SWIS), as it can aide states in satisfying Workforce Innovation and Opportunity Act (WIOA) reporting requirements, and help states better understand whether former participants in workforce training and education programs are finding good jobs. SWIS is a data sharing…
Descriptors: Federal Legislation, Labor Force Development, Salary Wage Differentials, Employment
Adorjan, Michael; Ricciardelli, Rosemary – Learning, Media and Technology, 2019
While previous research identifies skepticism and some animosity among students towards school-based cyber-safety programs, drawing from focus group discussions with Canadian teens, this paper contributes to unpacking reasons for both support for 'what works' and antagonism for what is perceived to be lacking. Our findings reveal support for…
Descriptors: Information Security, Computer Security, Criticism, High School Students
Wolf, Shaya; Burrows, Andrea Carneal; Borowczak, Mike; Johnson, Mason; Cooley, Rafer; Mogenson, Kyle – Education Sciences, 2020
Research on innovative, integrated outreach programs guided three separate week-long outreach camps held across two summers (2018 and 2019). These camps introduced computer science through real-world applications and hands-on activities, each dealing with cybersecurity principles. The camps utilized low-cost hardware and free software to provide a…
Descriptors: Outreach Programs, Summer Programs, Camps, Program Length
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Bussey, Karen; Dancy, Kim; Voight, Mamie – Institute for Higher Education Policy, 2019
Accurately evaluating what works -- and what doesn't -- to improve student progression through higher education requires the robust use of reliable data. States play a pivotal role in compiling and using data to empower student choice, spur continuous institutional and system improvement, and develop evidence-based solutions that promote college…
Descriptors: Postsecondary Education, Evidence Based Practice, Data Collection, Data Use
Okolo, Nkiru Benjamin – ProQuest LLC, 2016
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Descriptors: Information Security, Foreign Countries, Confidentiality, Information Systems
Previous Page | Next Page »
Pages: 1 | 2