Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Best Practices | 2 |
Information Security | 2 |
Student Attitudes | 2 |
Undergraduate Students | 2 |
Assignments | 1 |
Class Activities | 1 |
Computer Security | 1 |
Corporations | 1 |
Course Descriptions | 1 |
Data Collection | 1 |
Disadvantaged | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Massachusetts | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brandon, Esther – Change: The Magazine of Higher Learning, 2021
This article describes a 6-week module course called Just Google It! that the author developed and teaches each fall semester. Students who take the course explore personal data collection by private companies, search algorithms, identify implicit bias in the results, and learn the best recommended privacy and security practices. At the end of the…
Descriptors: Technological Literacy, Course Descriptions, Data Collection, Corporations
Ramlo, Susan E.; Nicholas, John B. – Journal of Cybersecurity Education, Research and Practice, 2020
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study…
Descriptors: Student Attitudes, Information Security, Best Practices, Computer Security