NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 13 results Save | Export
Makri-Werzen, Denise – ProQuest LLC, 2022
The 21st century has brought about an increase in the popularity of social media networking usage on a global level, especially among college students. Social connectivity has become a vital part of the daily lives of college students, providing connections with their educational, personal, and social lives. The purpose of this qualitative study…
Descriptors: Social Media, Social Networks, College Students, Student Attitudes
R. Ikuenobe Osolease – ProQuest LLC, 2021
The purpose of this study is to identify the best model that explains the relationship between conflicting risk structures and decision quality. Using confirmatory factor analysis and hierarchical regression techniques as statistical methods, the author confirmed that changes in the conflicting risk structures correlated with changes in decision…
Descriptors: Computer Security, Information Security, Risk Management, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Harrison, Amanda; Phelps, Megan; Nerminathan, Arany; Alexander, Shirley; Scott, Karen M. – British Journal of Educational Technology, 2019
University policies prohibiting use of mobile devices by medical students during clinical placements are contradicted by regular use by physicians. Consequently, many students use their mobile devices, which can be beneficial for learning but may put patient privacy at risk. This study explores the reasons underlying students' decisions about…
Descriptors: College Students, Decision Making, Handheld Devices, Medical Students
Association of Governing Boards of Universities and Colleges, 2021
Every year, more news outlets report cybersecurity?breaches--and higher education is not immune from these sinister trends. Cyberattacks on colleges, universities, and foundations have become more frequent, more sophisticated, and more dangerous. Successful cyberattacks can compromise an institution's reputation, result in substantial financial…
Descriptors: Information Security, Higher Education, Governing Boards, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Labrecque, Lauren I.; Markos, Ereni; Darmody, Aron – Journal of Marketing Education, 2021
Sophisticated technology advances are delivering new and powerful ways for marketers to collect and use consumer data. These data-driven marketing capabilities present a unique challenge for students, as they will soon be expected to manage consumer data and make business decisions based on ethical, legal, and fiscal considerations. This article…
Descriptors: Marketing, Advertising, Privacy, Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Walker, Kristen L.; Moran, Nora – Journal of Marketing Education, 2019
The marketing field is undergoing dramatic shifts in the digital age. The increasing reliance on, collection, and use of data enabled by technological innovations requires teaching the responsible use of data for personalization, and marketing educators play a critical role. Students, universities, accrediting agencies, and employers demand…
Descriptors: Data Use, Social Responsibility, Consumer Economics, Business Administration Education
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Smith, Marcus L., Jr. – ProQuest LLC, 2016
During its infancy, the cloud computing industry was the province largely of small and medium-sized business customers. Despite their size, these companies required a professionally run, yet economical information technology (IT) operation. These customers used a total value strategy whereby they avoided paying for essential, yet underutilized,…
Descriptors: Decision Making, Administrator Attitudes, Information Technology, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wojniak, Justyna; Majorek, Marta – Universal Journal of Educational Research, 2016
The paper concerns the opportunities of use information and communication technologies for the education purposes. It presents key assumptions of the European Union policy concerning innovative methods of training and the prospects for their further development. As nowadays one can observe increasing activity of the children and young people in…
Descriptors: Internet, Information Security, Child Safety, Risk
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Boninger, Faith; Molnar, Alex – National Education Policy Center, 2020
The COVID-19 pandemic has given the entire country a crash course in virtual education and digital education platforms. School leaders have been forced to consider a set of very imperfect options as they struggle to reopen their schools. This three-brief collection identifies key issues for school leaders to consider before adopting a digital…
Descriptors: Educational Technology, Technology Uses in Education, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Scott, Karen M.; Nerminathan, Arany; Alexander, Shirley; Phelps, Megan; Harrison, Amanda – British Journal of Educational Technology, 2017
This study was conducted with medical students, physicians, patients and carers in a paediatric and an adult hospital to determine use of mobile devices for learning, and beliefs and attitudes about others' use. Awareness of ethical, patient privacy and data security concerns was explored. The research was conducted using a mixed-methods…
Descriptors: Handheld Devices, Technology Uses in Education, Medical Education, Medical Students
Alberta Education, 2013
Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…
Descriptors: Internet, Educational Technology, Computer Uses in Education, Shared Resources and Services
Yang, Yubao – ProQuest LLC, 2011
Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…
Descriptors: Information Security, Surveys, Information Technology, Economic Factors