Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 13 |
Since 2006 (last 20 years) | 15 |
Descriptor
Information Security | 15 |
Teaching Methods | 15 |
Telecommunications | 15 |
Handheld Devices | 11 |
Computer Software | 6 |
Foreign Countries | 6 |
Higher Education | 6 |
Technology Uses in Education | 6 |
Computer Science Education | 5 |
Educational Technology | 5 |
College Students | 4 |
More ▼ |
Source
Author
Al Bairaq, Saeed | 1 |
Al Matrooshi, Mohammed | 1 |
Ayesha Juhi | 1 |
Belshaw, Scott H. | 1 |
Carliner, Saul, Ed. | 1 |
Cater, Scott | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Fleming, Antoine | 1 |
Gonzalez, Jennifer | 1 |
Harron, Jason | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Dissertations/Theses -… | 4 |
Reports - Research | 4 |
Reports - Evaluative | 3 |
Collected Works - Proceedings | 2 |
Reports - Descriptive | 2 |
Speeches/Meeting Papers | 2 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Elementary Secondary Education | 3 |
Secondary Education | 3 |
Elementary Education | 1 |
High Schools | 1 |
Audience
Teachers | 1 |
Location
India | 2 |
Arkansas | 1 |
Belgium | 1 |
Bulgaria | 1 |
Germany | 1 |
Italy | 1 |
Mexico | 1 |
Morocco | 1 |
South Africa | 1 |
Texas | 1 |
Texas (Dallas) | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Himel Mondal; Juhu Kiran Krushna Karri; Swaminathan Ramasubramanian; Shaikat Mondal; Ayesha Juhi; Pratima Gupta – Advances in Physiology Education, 2025
Large language models (LLMs)-based chatbots use natural language processing and are a type of generative artificial intelligence (AI) that is capable of comprehending user input and generating output in various formats. They offer potential benefits in medical education. This study explored the student's feedback on the utilization of LLMs in…
Descriptors: Computational Linguistics, Physiology, Teaching Methods, Artificial Intelligence
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Toperesu, B-Abee; Van Belle, Jean-Paul – International Association for Development of the Information Society, 2018
The field of mobile learning has received much attention in both the academic research fields and the practical fields. Yet the implementation rate is low with very few higher education institutions (HEIs) offering full support for this channel. The aim of this research is to evaluate the different mobile learning considerations as identified in…
Descriptors: Telecommunications, Handheld Devices, Educational Technology, Technology Uses in Education
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Milenkova, Valentina; Manov, Boris – International Association for Development of the Information Society, 2019
The present article aims to show the emergence of digital technologies in university education as a way for the formation of digital literacy in the contemporary knowledge society. The article analyzes the changes, which occur in university education creating prerequisites for mobile learning. Special attention paid to distance learning, where…
Descriptors: Educational Technology, Technology Uses in Education, Technological Literacy, Higher Education
Data Literacy on the Road: Setting up a Large-Scale Data Literacy Initiative in the Databuzz Project
Seymoens, Tom; Van Audenhove, Leo; Van den Broeck, Wendy; Mariën, Ilse – Journal of Media Literacy Education, 2020
This paper presents "the DataBuzz Project." "DataBuzz" is a high-tech, mobile educational lab, which is housed in a 13-meter electric bus. Its specific goal is to increase the data literacy of different segments of society in the Brussels region through inclusive and participatory games and workshops. In this paper, we will…
Descriptors: Data Analysis, Literacy, Program Descriptions, Laboratories
Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott – Science Teacher, 2017
The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…
Descriptors: Crime, Telecommunications, Handheld Devices, Science Instruction
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Trabelsi, Zouheir; Al Matrooshi, Mohammed; Al Bairaq, Saeed; Ibrahim, Walid; Masud, Mohammad M. – Education and Information Technologies, 2017
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to students' daily lives). Particularly, information security education should reflect the current…
Descriptors: Telecommunications, Handheld Devices, Student Interests, Best Practices
Fleming, Antoine – ProQuest LLC, 2017
Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…
Descriptors: Information Security, Case Studies, Qualitative Research, Holistic Approach
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Carliner, Saul, Ed.; Ostashewski, Nathaniel, Ed. – Association for the Advancement of Computing in Education, 2015
The Association for the Advancement of Computing in Education (AACE) is an international, non-profit educational organization. The Association's purpose is to advance the knowledge, theory, and quality of teaching and learning at all levels with information technology. "EdMedia 2015: World Conference on Educational Media &…
Descriptors: Educational Technology, Technology Uses in Education, Action Research, Instructional Design
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation