NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 526 to 540 of 1,589 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ruenphongphun, Prarichart; Sukkamart, Aukkapong; Pimdee, Paitoon – World Journal on Educational Technology: Current Issues, 2021
From the study's initial qualitative analysis, 10 latent variables and 22 indicators concerning digital citizenship skills (DCS) were used in a questionnaire on a sample of 506 Thai Business Computer Programme undergraduate students attending one of six regional Thai Rajabhat Universities. Goodness-of-fit and descriptive statistical analysis…
Descriptors: Undergraduate Students, Citizenship Education, Business Administration Education, Student Attitudes
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Adrian Curaj; Cezar Hâj; Cosmin Holeab; Irina Geanta; Alina Iura; Dorin Cote?; Oana ?în?ar – European Union, 2025
The present report overseen by the Executive Agency for Higher Education, Research, Development and Innovation Funding (UEFISCDI) on behalf of the European Commission and the European Education and Culture Executive Agency as part of the contract for the implementation of the European Digital Education Hub, is the third report in a series…
Descriptors: Foreign Countries, Educational Innovation, Electronic Learning, Educational Practices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sharma, Vipin K.; Holbah, Wael A. – Arab World English Journal, 2022
The study investigates teachers' perceptions of the use of online language assessment (OLA) using technology and examines the scope of using online applications to validate the mode of assessment. It looks for EFL teachers' opinions of OLA to comprehend the many worries associated with the issues and improve the online assessment tools. The…
Descriptors: Language Teachers, Teacher Attitudes, English (Second Language), Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Liesen, Joseph J. – ProQuest LLC, 2017
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
Descriptors: Qualitative Research, Case Studies, Barriers, Small Colleges
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
Schools (public and nonpublic) and school districts face a myriad of challenging hazards and threats. In addition to natural hazards, technological hazards, and biological hazards, they now have to prepare for human-caused cyber threats. These incidents can be accidental or deliberate and disrupt education and critical operations; expose sensitive…
Descriptors: Computer Security, Information Security, Elementary Schools, Secondary Schools
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
The ability to securely connect to virtual systems is an important element within a safe and supportive learning environment. This is particularly the case within institutions of higher education (IHEs), where students are increasingly learning in digital formats; faculty, staff, and visitors are constantly accessing and sharing information…
Descriptors: Computer Security, Information Security, Higher Education, Universities
Armstead, Stanley K. – ProQuest LLC, 2017
In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…
Descriptors: Military Personnel, Foreign Countries, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gallego-Arrufat, María-Jesús; Torres-Hernández, Norma; Pessoa, Teresa – Comunicar: Media Education Research Journal, 2019
The use of technologies and the Internet poses problems and risks related to digital security. This article presents the results of a study on the evaluation of the digital competence of future teachers in the DigCompEdu European framework. 317 undergraduate students from Spain and Portugal answered a questionnaire with 59 items, validated by…
Descriptors: Teacher Competencies, Educational Technology, Technology Uses in Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Braiko, Bohdan – Comparative Professional Pedagogy, 2019
The article deals with the relevant problem of updating the system of graduate training (master's degree) in Ukraine. It analyzes the ways of Ukraine's integration into the European Higher Education Area and the legal framework of higher education in Ukraine and the UK. It also presents a comparative pedagogical analysis of the features of…
Descriptors: Comparative Education, Information Security, Computer Security, Masters Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Dazhi; Xu, Dianxiang; Yeh, Jyh-haw; Fan, Yibo – Journal of STEM Education: Innovations and Research, 2019
Undergraduate research opportunities have expanded from elite universities in the United States to universities and institutions of all ranks and sizes. Research studies have shown positive outcomes in regards to the research experience for undergraduates (REU), such as enhanced research skills and competencies. However, with the widespread…
Descriptors: Undergraduate Students, Student Research, Computer Security, Information Security
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Onah, Daniel F. O.; Pang, Elaine L. L.; Sinclair, Jane E. – Education and Information Technologies, 2020
Independent learning in massive open online courses (MOOCs) requires considerable effort from the learners themselves. Blended-learning has been recognised to foster independent learning among undergraduate students. With the popularity of the blended-learning approach to teach in traditional educational settings, little has been mentioned on how…
Descriptors: Positive Attitudes, Blended Learning, Student Attitudes, Metacognition
Peer reviewed Peer reviewed
Direct linkDirect link
Adorjan, Michael; Ricciardelli, Rosemary – Learning, Media and Technology, 2019
While previous research identifies skepticism and some animosity among students towards school-based cyber-safety programs, drawing from focus group discussions with Canadian teens, this paper contributes to unpacking reasons for both support for 'what works' and antagonism for what is perceived to be lacking. Our findings reveal support for…
Descriptors: Information Security, Computer Security, Criticism, High School Students
Pages: 1  |  ...  |  32  |  33  |  34  |  35  |  36  |  37  |  38  |  39  |  40  |  ...  |  106