NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Policymakers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Xuandong Zhao – ProQuest LLC, 2024
The rapid advancement of powerful Large Language Models (LLMs), such as ChatGPT and Llama, has revolutionized the world by bringing new creative possibilities and enhancing productivity. However, these advancements also pose significant challenges and risks, including the potential for misuse in the form of fake news, academic dishonesty,…
Descriptors: Computational Linguistics, Intellectual Property, Artificial Intelligence, Productivity
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mustafa Koc; Sema Golcukcu – International Society for Technology, Education, and Science, 2024
While there are many conveniences that the widespread use of the Internet provides us today, there are also some risks that come with these conveniences. One of these risks is the disclosure of personal data. Personal data can be defined as any information regarding an identified or identifiable real person. It can be argued that wide use of…
Descriptors: Preservice Teachers, Teacher Education Programs, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Elgharnah, Khairi Ghet Elghadafi; Ozdamli, Fezile – World Journal on Educational Technology: Current Issues, 2020
Internet security safety awareness of parents is an important issue that should be addressed to raise the knowledge and awareness level about internet risks, information privacy, personal information, safety concerns and online attacks among parents to be able to teach their children to keep safe use on the internet. This study amid to investigate…
Descriptors: Internet, Safety, Parents, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
XiaoShu Xu; Xibing Wang; Yunfeng Zhang; Wenjuan Ma – International Society for Technology, Education, and Science, 2023
The integration of ChatGPT in Personal Learning Environments (PLEs) has emerged as a promising approach to personalized learning in tertiary education. ChatGPT is believed to have the potential to transform traditional higher education into a more personalized, quality-driven, and student-centered learning experience that fosters critical…
Descriptors: Artificial Intelligence, Computer Software, Risk, Educational Benefits
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chin, Amita G.; Little, Philip; Jones, Beth H. – International Journal of Education and Development using Information and Communication Technology, 2020
In 2019, the number of smartphone users in the United States was estimated to be over 266 million, or 81% of the population. While smartphones, combined with a plethora of apps that are readily available, have become wholly integrated into our daily lives, they embody a multitude of risks for consumers. The purpose of this study is to assess…
Descriptors: State Universities, Undergraduate Students, Telecommunications, Handheld Devices
Josh Freeman – Higher Education Policy Institute, 2025
Building on our 2024 AI Survey, we surveyed 1,041 full-time undergraduate students through Savanta about their use of generative artificial intelligence (GenAI) tools. In 2025, we find that the student use of AI has surged in the last year, with almost all students (92%) now using AI in some form, up from 66% in 2024, and some 88% having used…
Descriptors: Student Surveys, Student Attitudes, Cheating, Artificial Intelligence
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Labrecque, Lauren I.; Markos, Ereni; Darmody, Aron – Journal of Marketing Education, 2021
Sophisticated technology advances are delivering new and powerful ways for marketers to collect and use consumer data. These data-driven marketing capabilities present a unique challenge for students, as they will soon be expected to manage consumer data and make business decisions based on ethical, legal, and fiscal considerations. This article…
Descriptors: Marketing, Advertising, Privacy, Comparative Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Saeed J. Roohani; Xiaochuan Zheng – Advances in Accounting Education: Teaching and Curriculum Innovations, 2019
With recent increases in cybersecurity incidents, it is imperative to supplement current accounting curriculum, equip accounting graduates with sufficient knowledge and skills to assess cybersecurity risk, and learn about controls to mitigate such risks. In this chapter, the authors describe 10 teaching modules, supported by 10 professionally…
Descriptors: Accounting, Professional Education, Business Administration Education, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, Nicole M. – Communication Education, 2018
The Internet poses a variety of risks at both the individual and societal levels including scams and the spread of misinformation. Older adults are especially vulnerable to many of these risks. This paper argues that one important strategy for combating such threats is through digital media literacy education. Although a good deal of research on…
Descriptors: Deception, Computer Mediated Communication, Internet, Misconceptions
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Smith, Marcus L., Jr. – ProQuest LLC, 2016
During its infancy, the cloud computing industry was the province largely of small and medium-sized business customers. Despite their size, these companies required a professionally run, yet economical information technology (IT) operation. These customers used a total value strategy whereby they avoided paying for essential, yet underutilized,…
Descriptors: Decision Making, Administrator Attitudes, Information Technology, Computer Software
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Almohri, Hussain M. J. – ProQuest LLC, 2013
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Descriptors: Computer Security, Information Security, Risk, Computer Networks
Previous Page | Next Page ยป
Pages: 1  |  2