Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 14 |
Since 2006 (last 20 years) | 16 |
Descriptor
Handheld Devices | 16 |
Information Security | 16 |
Teaching Methods | 16 |
Telecommunications | 11 |
Foreign Countries | 8 |
Technology Uses in Education | 7 |
Computer Security | 6 |
Higher Education | 6 |
Computer Science Education | 5 |
Educational Technology | 5 |
Online Courses | 5 |
More ▼ |
Source
Author
Al Bairaq, Saeed | 1 |
Al Matrooshi, Mohammed | 1 |
Bandara, Arosha | 1 |
Belshaw, Scott H. | 1 |
Burden, Kevin | 1 |
Caldwell, Helen | 1 |
Carliner, Saul, Ed. | 1 |
Cater, Scott | 1 |
Gonzalez, Jennifer | 1 |
Harron, Jason | 1 |
Ibrahim, Walid | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 6 |
Collected Works - Proceedings | 4 |
Reports - Evaluative | 3 |
Dissertations/Theses -… | 2 |
Speeches/Meeting Papers | 2 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 9 |
Postsecondary Education | 8 |
Secondary Education | 4 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
High Schools | 2 |
Grade 8 | 1 |
Grade 9 | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Audience
Teachers | 1 |
Location
United Kingdom | 2 |
Belgium | 1 |
Bulgaria | 1 |
Germany | 1 |
India | 1 |
Italy | 1 |
Mexico | 1 |
Morocco | 1 |
South Africa | 1 |
Taiwan | 1 |
Texas | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Toperesu, B-Abee; Van Belle, Jean-Paul – International Association for Development of the Information Society, 2018
The field of mobile learning has received much attention in both the academic research fields and the practical fields. Yet the implementation rate is low with very few higher education institutions (HEIs) offering full support for this channel. The aim of this research is to evaluate the different mobile learning considerations as identified in…
Descriptors: Telecommunications, Handheld Devices, Educational Technology, Technology Uses in Education
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Milenkova, Valentina; Manov, Boris – International Association for Development of the Information Society, 2019
The present article aims to show the emergence of digital technologies in university education as a way for the formation of digital literacy in the contemporary knowledge society. The article analyzes the changes, which occur in university education creating prerequisites for mobile learning. Special attention paid to distance learning, where…
Descriptors: Educational Technology, Technology Uses in Education, Technological Literacy, Higher Education
Data Literacy on the Road: Setting up a Large-Scale Data Literacy Initiative in the Databuzz Project
Seymoens, Tom; Van Audenhove, Leo; Van den Broeck, Wendy; Mariën, Ilse – Journal of Media Literacy Education, 2020
This paper presents "the DataBuzz Project." "DataBuzz" is a high-tech, mobile educational lab, which is housed in a 13-meter electric bus. Its specific goal is to increase the data literacy of different segments of society in the Brussels region through inclusive and participatory games and workshops. In this paper, we will…
Descriptors: Data Analysis, Literacy, Program Descriptions, Laboratories
Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott – Science Teacher, 2017
The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…
Descriptors: Crime, Telecommunications, Handheld Devices, Science Instruction
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
Trabelsi, Zouheir; Al Matrooshi, Mohammed; Al Bairaq, Saeed; Ibrahim, Walid; Masud, Mohammad M. – Education and Information Technologies, 2017
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to students' daily lives). Particularly, information security education should reflect the current…
Descriptors: Telecommunications, Handheld Devices, Student Interests, Best Practices
Sun, Jerry Chih-Yuan; Lee, Kuan-Hsien – Educational Technology & Society, 2016
The purpose of this study is to evaluate the feasibility of the integration of concept maps and tablet PCs in anti-phishing education for enhancing students' learning motivation and achievement. The subjects were 155 students from grades 8 and 9. They were divided into an experimental group (77 students) and a control group (78 students). To begin…
Descriptors: Learning Motivation, Teaching Methods, Concept Mapping, Handheld Devices
Association Supporting Computer Users in Education, 2017
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Computer Software, Conferences (Gatherings)
Male, Trevor; Burden, Kevin – Technology, Pedagogy and Education, 2014
This article considers how developments in technologies have transformed the kind of social interaction possible over the Internet, making it feasible to undertake discourse and dialogue without having to rely solely on text-based mediation. This represents a fundamental change to learning, shifting from passive acquisition of someone else's ideas…
Descriptors: Technology Uses in Education, Technology Integration, Access to Computers, Access to Information
Simonson, Michael, Ed. – Association for Educational Communications and Technology, 2016
For the thirty-ninth time, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the annual AECT Convention in Las Vegas, Nevada. The Proceedings of AECT's Convention are published in two volumes.…
Descriptors: Annual Reports, Conference Papers, Conferences (Gatherings), Teaching Methods
Carliner, Saul, Ed.; Ostashewski, Nathaniel, Ed. – Association for the Advancement of Computing in Education, 2015
The Association for the Advancement of Computing in Education (AACE) is an international, non-profit educational organization. The Association's purpose is to advance the knowledge, theory, and quality of teaching and learning at all levels with information technology. "EdMedia 2015: World Conference on Educational Media &…
Descriptors: Educational Technology, Technology Uses in Education, Action Research, Instructional Design
Previous Page | Next Page »
Pages: 1 | 2