Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Student Surveys | 4 |
Telecommunications | 4 |
Foreign Countries | 3 |
Internet | 3 |
Business Administration… | 2 |
Classroom Environment | 2 |
College Students | 2 |
Comparative Analysis | 2 |
Competition | 2 |
Computer Games | 2 |
More ▼ |
Source
Africa Education Review | 1 |
IEEE Transactions on Education | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Author
Battisti, F. | 1 |
Boato, G. | 1 |
Carli, M. | 1 |
Chin, Amita | 1 |
Jones, Beth | 1 |
Kritzinger, Elmarie | 1 |
Little, Philip | 1 |
Neri, A. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Italy | 2 |
United States | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Finland | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chin, Amita; Jones, Beth; Little, Philip – International Journal of Education and Development using Information and Communication Technology, 2021
This study on smartphone security behaviors and practices is a continuation of the work in Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive university were compared to results from a 2014 survey at the same institution. That study found that students continued to be lax in their mobile security practices.…
Descriptors: Telecommunications, Handheld Devices, Computer Security, Student Attitudes
Kritzinger, Elmarie – Africa Education Review, 2017
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
Descriptors: School Culture, Foreign Countries, Computer Security, Safety
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers