NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Morgan, Hani – Reading Improvement, 2015
Today an increasing number of teachers have successfully implemented blogging with students ranging from kindergarten through high school (Hungerford-Kresser, Wiggins, & Amaro-Jimenez, 2012). Although research on blogging is scant, existing studies suggest it can benefit students in various ways (Meinecke, Smith, & Lehmann-Willenbrock,…
Descriptors: Web 2.0 Technologies, Social Media, Cooperative Learning, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy