NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chin, Amita; Jones, Beth; Little, Philip – International Journal of Education and Development using Information and Communication Technology, 2021
This study on smartphone security behaviors and practices is a continuation of the work in Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive university were compared to results from a 2014 survey at the same institution. That study found that students continued to be lax in their mobile security practices.…
Descriptors: Telecommunications, Handheld Devices, Computer Security, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Perrault, Evan K. – Journal of Educational Computing Research, 2018
Despite improved spam filtering technology, phishing continues to be a prevalent threat for college students. The current study found that approximately 4-in-10 of the students surveyed (N = 462) indicate they do not know what phishing is and the threat it poses. Students also report initially overestimating their confidence to successfully…
Descriptors: Online Courses, Electronic Learning, Student Attitudes, Intention
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Florence; Wang, Chuang; Petty, Teresa; Wang, Weichao; Wilkins, Patti – Educational Technology & Society, 2018
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and "bring your own technology" initiatives, attention to these topics is becoming increasingly important. A total of 593…
Descriptors: Middle School Students, Social Media, Student Surveys, Bullying
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Smith, Catherine L. – Information Research: An International Electronic Journal, 2016
Introduction: The analysis of detailed interaction records is fundamental to development of user-centred systems. Researchers seeking such data must recruit volunteers willing to allow tracking of their interactions. This study examines privacy and trust attitudes in the intent to volunteer for research requiring installation of tracking software.…
Descriptors: Privacy, Trust (Psychology), Data Analysis, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Coggins, Porter E. – Computers in the Schools, 2013
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Descriptors: Computer Security, Elementary School Students, Student Attitudes, Computer Attitudes
Jabbour, Khayrazad Kari – ProQuest LLC, 2011
Use of internet technologies is widespread in Lebanon. Technology has a revolutionary impact on our lives, behavior, and in particular a strong impact on our students. Part of our students every day routine is to use the computer and the Internet to play, learn, and communicate. Although most students use the computer and the Internet on a daily…
Descriptors: Foreign Countries, Ethics, Safety, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Maloney, Stephen; Moss, Alan; Ilic, Dragan – Advances in Health Sciences Education, 2014
Social Networking Sites (SNS) have seen exponential growth in recent years. The high utilisation of SNS by tertiary students makes them an attractive tool for educational institutions. This study aims to identify health professional students' use and behaviours with SNS, including students' perspectives on potential applications within…
Descriptors: Social Networks, Electronic Learning, Technology Uses in Education, Health Education
Boyle, Clifton J., III – ProQuest LLC, 2010
Misuse of technology is a behavioral pattern that continues to emerge in our society. Television and newspapers continue to list and report technology misuse. A recent study from the Pew Internet and American Life Project has indicated approximately one third of teen are victims of online harassment (Lenhart, 2009). Other prominent problems with…
Descriptors: Control Groups, Urban Schools, Citizenship, Video Games
Peer reviewed Peer reviewed
Direct linkDirect link
Seock, Yoo-Kyoung; Norton, Marjorie J. T. – College Student Journal, 2008
The purpose of this study was to examine perceptions of attributes of clothing retailers' Internet websites in relation to previous and intended future purchase from the websites. Survey data from 414 U.S. college students, non-married and aged 18-22 with online clothing shopping experience and favorite clothing websites were used. Five clothing…
Descriptors: College Students, Merchandise Information, Consumer Education, Factor Analysis
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers