Publication Date
In 2025 | 20 |
Since 2024 | 156 |
Since 2021 (last 5 years) | 416 |
Since 2016 (last 10 years) | 640 |
Since 2006 (last 20 years) | 1218 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Noguerón-Liu, Silvia – Journal of Adolescent & Adult Literacy, 2017
This article examines immigrant adults' understandings of privacy, risk, and vulnerability in digital literacy practices that involve visual media. Although the benefits of digital media production have been explored with immigrant youths, the perspectives of adults remain unexplored. Informed by critical and transnational perspectives to digital…
Descriptors: Immigrants, Adults, Privacy, Risk
Fidalgo, Patricia; Thormann, Joan – International Association for Development of the Information Society, 2017
This study of teachers in training in UAE addresses Information Literacy skills including ease of learning, usefulness and instructional preferences. Most teachers in training found that IL skills are both useful and ease to learn. Multiple instructional strategies were preferred by the teachers in training. The study also shows that although most…
Descriptors: Information Literacy, Privacy, Computer Security, Information Security
Ipek, Ziyaeddin Halid; Gözüm, Ali Ibrahim Can; Papadakis, Stamatios; Kallogiannakis, Michail – Educational Process: International Journal, 2023
Background/purpose: ChatGPT is an artificial intelligence program released in November 2022, but even now, many studies have expressed excitement or concern about its introduction into academia and education. While there are many questions to be asked, the current study reviews the literature in order to reveal the potential effects of ChatGPT on…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Educational Benefits
Business-Higher Education Forum, 2019
"Creating Purposeful Partnerships" offers insights into business-led regional talent ecosystems that facilitate access, alignment, and development of a prepared workforce with the skills necessary for companies' long-term success. The findings of this report serve as a playbook for CEOs and their executive teams for establishing…
Descriptors: Partnerships in Education, School Business Relationship, Higher Education, Teamwork
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Dawson, Phillip – British Journal of Educational Technology, 2016
Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves.…
Descriptors: Cheating, Computer Software, Laptop Computers, Computer Security
Barthur, Ashrith – ProQuest LLC, 2016
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding…
Descriptors: Computer Security, Information Security, Data Collection, Internet
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Tosun, Nilgün – Journal of Education and Training Studies, 2018
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Social Media
The Relationships of Social Cognitive Career Theory Factors and Cybersecurity Research Self-Efficacy
Chong, Rylan C. – ProQuest LLC, 2018
The purpose of this study was to investigate the relationships of social cognitive career theory factors of past performance, verbal persuasion, vicarious experience, outcome expectancy, interest, and former students' cybersecurity research self-efficacy; and examine whether the relationships were different among gender, academic classification,…
Descriptors: Social Cognition, Computer Security, Self Efficacy, Undergraduate Students
Hodge, Timothy D. – ProQuest LLC, 2018
The Department of Defense (DoD), like most very large organizations rightly have concerns over the functionality of their Cybersecurity employees and their ability to perform core duties in a professional manner. To validate this ability, the DoD imposed a mandatory certifications policy based upon positions within the organization. The DoD…
Descriptors: Public Agencies, Government Employees, Computer Security, Outcomes of Education
Payne, Brian K.; Vandecar-Burdin, Tancy; Cigularova, Daniela – NACADA Journal, 2022
In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the…
Descriptors: Information Security, Information Technology, Community Colleges, College Faculty
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Pitman, Lora; Payne, Brian K.; Vandecar-Burdin, Tancy; Thorbjornsen, Lenora – Journal of Cybersecurity Education, Research and Practice, 2022
As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across…
Descriptors: College Students, STEM Education, Computer Security, Information Security