Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 7 |
Electronic Mail | 7 |
Teaching Methods | 7 |
Internet | 4 |
Computer Mediated… | 3 |
Computer Software | 3 |
Computer Uses in Education | 3 |
Educational Technology | 3 |
Web Sites | 3 |
Computers | 2 |
Information Literacy | 2 |
More ▼ |
Source
Association of Small Computer… | 1 |
English Journal | 1 |
Jossey-Bass, An Imprint of… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Technical Writing… | 1 |
Learning & Leading with… | 1 |
ProQuest LLC | 1 |
Author
Beach, Richard | 1 |
Biros, David | 1 |
Boeser, Elizabeth | 1 |
Brown, Abbie | 1 |
Doerr-Stevens, Candance | 1 |
Green, Tim | 1 |
Johnson, Doug | 1 |
Laurel Lynn Schneider | 1 |
Robinson, LeAnne K. | 1 |
Ross, Derek G. | 1 |
Sikolia, David | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Books | 1 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Guides - Classroom - Teacher | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
South Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Doerr-Stevens, Candance; Beach, Richard; Boeser, Elizabeth – English Journal, 2011
This article discusses how students use online role-play to collaborate and change real school policy. Playing different characters in an online role-play, students explore controversial aspects of Internet filtering and adopt a plan to change their school's policy. Through engaging in collaborative argumentation during their role-play, students…
Descriptors: Online Courses, Peer Groups, School Policy, Role Playing
Ross, Derek G. – Journal of Technical Writing and Communication, 2009
Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters--modern perversions of "ars dictaminis" (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the…
Descriptors: Letters (Correspondence), Rhetoric, Rhetorical Criticism, Electronic Mail
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2004
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
Descriptors: Small Colleges, Computers, Student Surveys, Interaction