Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 9 |
Since 2006 (last 20 years) | 12 |
Descriptor
Handheld Devices | 12 |
Information Security | 12 |
Risk | 12 |
Telecommunications | 7 |
Computer Security | 4 |
Internet | 4 |
Student Attitudes | 4 |
College Students | 3 |
Computer Software | 3 |
Foreign Countries | 3 |
Information Technology | 3 |
More ▼ |
Source
ProQuest LLC | 4 |
British Journal of… | 2 |
Elementary School Journal | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Online Submission | 1 |
Shanlax International Journal… | 1 |
TechTrends: Linking Research… | 1 |
Author
Publication Type
Journal Articles | 6 |
Reports - Research | 6 |
Dissertations/Theses -… | 4 |
Collected Works - Proceedings | 2 |
Books | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Elementary Education | 2 |
Early Childhood Education | 1 |
Grade 1 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
Intermediate Grades | 1 |
Kindergarten | 1 |
Middle Schools | 1 |
Primary Education | 1 |
More ▼ |
Audience
Location
China | 2 |
Croatia | 2 |
India | 2 |
Saudi Arabia | 2 |
Albania | 1 |
Australia | 1 |
Costa Rica | 1 |
Kentucky | 1 |
Morocco | 1 |
North Carolina | 1 |
Philippines | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Leticia López-Castro; Mónica López-Ratón; Carolina Rodríguez-Llorente – Elementary School Journal, 2025
The link between technology use and cybervictimization in elementary education is less explored than in secondary education. Increased technology use since COVID-19 and high rates of cybervictimization among elementary students highlight the need to identify early risk factors. This study surveyed 1,169 families of fifth and sixth graders using a…
Descriptors: Crime, Victims, Elementary School Students, COVID-19
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Komalavalli, K.; Hemalatha, R.; Dhanalakshmi, S. – Shanlax International Journal of Education, 2020
In the current scenario, Smart Phones are one of the Artificial Intelligence devices regularly used by the students. The study aimed to know the utility of the SmartPhones in their day to day life, most useful applications and the valid security features of the Smart Phones and its impact among the Students at Higher Education level. Primary data…
Descriptors: Artificial Intelligence, Telecommunications, Handheld Devices, College Students
Harrison, Amanda; Phelps, Megan; Nerminathan, Arany; Alexander, Shirley; Scott, Karen M. – British Journal of Educational Technology, 2019
University policies prohibiting use of mobile devices by medical students during clinical placements are contradicted by regular use by physicians. Consequently, many students use their mobile devices, which can be beneficial for learning but may put patient privacy at risk. This study explores the reasons underlying students' decisions about…
Descriptors: College Students, Decision Making, Handheld Devices, Medical Students
Chin, Amita G.; Little, Philip; Jones, Beth H. – International Journal of Education and Development using Information and Communication Technology, 2020
In 2019, the number of smartphone users in the United States was estimated to be over 266 million, or 81% of the population. While smartphones, combined with a plethora of apps that are readily available, have become wholly integrated into our daily lives, they embody a multitude of risks for consumers. The purpose of this study is to assess…
Descriptors: State Universities, Undergraduate Students, Telecommunications, Handheld Devices
Fulton, Joel – ProQuest LLC, 2017
Bring your own device (BYOD) is the use of uncontrolled devices, which increases risks to business data and intellectual property. Like centralized and distributed computing adoption before it, the rapid proliferation of BYOD has outstripped security advances. The trend is growing due to the expectations of the Millennial workforce and its high…
Descriptors: Generational Differences, Ownership, Technological Literacy, Handheld Devices
Almohri, Hussain M. J. – ProQuest LLC, 2013
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Descriptors: Computer Security, Information Security, Risk, Computer Networks
Owens, Rodney – ProQuest LLC, 2013
Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…
Descriptors: Computer Software, Risk, Handheld Devices, Information Technology
Jones, Beth H.; Chin, Amita Goyal; Aiken, Peter – TechTrends: Linking Research and Practice to Improve Learning, 2014
The increase in smartphone adoption has been no less than astounding. Unfortunately, the explosive growth has been accompanied by a rash of security problems. A contributing factor to the growing security problem is a lack of education, training, and awareness. In addition, "bring your own device" (BYOD) policies often leave security…
Descriptors: Risk, Handheld Devices, Information Security, Undergraduate Students
Scott, Karen M.; Nerminathan, Arany; Alexander, Shirley; Phelps, Megan; Harrison, Amanda – British Journal of Educational Technology, 2017
This study was conducted with medical students, physicians, patients and carers in a paediatric and an adult hospital to determine use of mobile devices for learning, and beliefs and attitudes about others' use. Awareness of ethical, patient privacy and data security concerns was explored. The research was conducted using a mixed-methods…
Descriptors: Handheld Devices, Technology Uses in Education, Medical Education, Medical Students
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology