NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Brandon, Esther – Change: The Magazine of Higher Learning, 2021
This article describes a 6-week module course called Just Google It! that the author developed and teaches each fall semester. Students who take the course explore personal data collection by private companies, search algorithms, identify implicit bias in the results, and learn the best recommended privacy and security practices. At the end of the…
Descriptors: Technological Literacy, Course Descriptions, Data Collection, Corporations
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ramlo, Susan E.; Nicholas, John B. – Journal of Cybersecurity Education, Research and Practice, 2020
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study…
Descriptors: Student Attitudes, Information Security, Best Practices, Computer Security