Publication Date
| In 2026 | 0 |
| Since 2025 | 18 |
| Since 2022 (last 5 years) | 64 |
| Since 2017 (last 10 years) | 107 |
| Since 2007 (last 20 years) | 207 |
Descriptor
Source
Author
| Jenay Robert | 3 |
| Martin, Florence | 3 |
| Almes, Guy T. | 2 |
| Berson, Ilene R. | 2 |
| Berson, Michael J. | 2 |
| Corn, Michael | 2 |
| Florence Martin | 2 |
| Foster, Andrea L. | 2 |
| Gezer, Tuba | 2 |
| Grush, Mary | 2 |
| Jamie Reeves | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Canada | 7 |
| Turkey | 7 |
| United Kingdom | 5 |
| United States | 5 |
| Australia | 4 |
| California | 4 |
| Massachusetts | 4 |
| North Carolina | 4 |
| Ohio | 4 |
| Pennsylvania | 4 |
| Brazil | 3 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Ganesh Iyer – ProQuest LLC, 2021
This quantitative, cross-sectional study investigated the relationship between the concern for information privacy (CFIP) of Indian undergraduate students and their willingness to provide personal information to transact on the Internet (PPIT). The study also examined the mediating effects of internet trust and perceived internet privacy risk on…
Descriptors: Foreign Countries, Undergraduate Students, Privacy, Computer Security
Karst, Nathaniel; Slegers, Rosa – PRIMUS, 2019
Many of the applied mathematics courses we teach touch upon a range of rich and important ethical issues -- issues that, for a number of reasons, are rarely openly discussed in class. In this work, we describe a sequence of activities co-designed and co-taught by philosophy and mathematics faculty in the hopes of bridging the divide between the…
Descriptors: Team Teaching, Ethics, Mathematics Instruction, Technology
Cypers, Scott Jared; Lopez, Amy – Children & Schools, 2021
The COVID-19 pandemic and subsequent quarantine orders led to a lot of uncertainty, fear, and mental health difficulty around the world. To be able to support the community during this time of crisis, especially when no in-person crisis services could be provided, an online mental health support and parenting group was offered to the community.…
Descriptors: COVID-19, Pandemics, Mental Health, Access to Health Care
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Kim, Sang Soo – Interactive Learning Environments, 2023
As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary to explore the motivators and barriers to student engagement comprehensively. Given the nature of an online learning environment, this study specifically focused on security…
Descriptors: Online Courses, Universities, COVID-19, Pandemics
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
Karagozlu, Damla – Cypriot Journal of Educational Sciences, 2020
As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study…
Descriptors: Preservice Teachers, Computer Security, Information Security, Student Behavior
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Tessa Consoli – Frontline Learning Research, 2024
Based on a national survey of 8,915 students, this study examines the prevalence of different types of media education practices in Swiss upper secondary schools and their relationship with students' online civic engagement and respectful online behavior. Descriptive statistics reveal that schools place little emphasis on media education and that…
Descriptors: Media Education, Teaching Methods, Differences, Citizen Participation
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2022
This Information Technology Specialist Resource List provides resources on understanding the role of information technology specialists in supporting school safety before, during, and after an emergency. Resources are organized into the following categories: (1) Cybersecurity and Cyber Safety Considerations for Schools and Districts; (2)…
Descriptors: Information Technology, Specialists, Role, School Safety
Mengkorn Pum; Sarin Sok – Asian Journal of Distance Education, 2024
With current state-of-the-art advances in artificial intelligence (AI), especially large language models, such as Google's Gemini, Microsoft's Copilot, and ChatGPT, among others, a plethora of research on this phenomenon has been conducted worldwide aiming to examine its limitations, benefits and ethical implications. Nonetheless, such a…
Descriptors: Foreign Countries, Artificial Intelligence, Technology Uses in Education, Computer Software

Peer reviewed
Direct link
