NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 256 to 270 of 1,589 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Hinchman, David B. – US Government Accountability Office, 2022
The COVID-19 pandemic forced schools across the nation to increase their reliance on IT to deliver educational instruction to students. This amplified the vulnerability of K-12 schools to potentially serious cyberattacks. The US Government Accountability Office (GAO) was asked to review cybersecurity in K-12 schools. The objectives of this report…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Government Role
Jakob E. Barnard – ProQuest LLC, 2022
This project examined the adoption of cybersecurity into computing programs within liberal arts programs and whether the rate constitutes an innovative program. The research questions focused on the lived experience existing faculty members have had with the cybersecurity curriculum within liberal arts computing programs. Liberal arts general…
Descriptors: Hermeneutics, Phenomenology, Computer Security, Computer Science Education
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
Chapman, John – Higher Education Policy Institute, 2019
Higher education regularly experiences cyber attacks. Organisations that do not adequately protect themselves risk the loss or exposure of personal student and staff data and also commercial, institutional and research data that are valuable to cyber criminals operating domestically and internationally. This paper discusses: (1) the current…
Descriptors: Higher Education, Internet, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Saleh, Mohamad – Journal of Instructional Research, 2020
Having a clear teaching strategy is vital when it comes to improving students' retention and preserving their knowledge. Various general teaching approaches have been incorporated into the classrooms as ways of improving teaching and student learning. Some of these approaches proved to be effective and some are ineffective. In this study, I…
Descriptors: Teaching Methods, Computer Security, Instructional Effectiveness, STEM Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2021
Business schools can meet the increasingly multidisciplinary requirements of training cybersecurity professionals. But in developing curriculums, they face different cybersecurity curricular frameworks with diverse emphases. Using a meta-framework consisting of a 2x3 model and a 2x2 model, this study examines ten cybersecurity curricular…
Descriptors: Computer Security, Information Security, Business Administration Education, Curriculum Development
Ganesh Iyer – ProQuest LLC, 2021
This quantitative, cross-sectional study investigated the relationship between the concern for information privacy (CFIP) of Indian undergraduate students and their willingness to provide personal information to transact on the Internet (PPIT). The study also examined the mediating effects of internet trust and perceived internet privacy risk on…
Descriptors: Foreign Countries, Undergraduate Students, Privacy, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Lim, Alliyza; Brewer, Neil; Young, Robyn L. – Journal of Autism and Developmental Disorders, 2023
Reports of cybercrime being committed by people on the autism spectrum often imply that autism may be more prevalent among cybercriminals than the general population, although this remains unproven. In an online survey of 302 participants, we found that autistic individuals (n = 25) were more likely to report engagement in cybercrime than…
Descriptors: Crime, Internet, Information Security, Autism Spectrum Disorders
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Peer reviewed Peer reviewed
Direct linkDirect link
Belessova, Damira; Ibashova, Almira; Bosova, Lyudmila; Shaimerdenova, Guldana – Open Education Studies, 2023
The article is an analysis of the current topic -- digitalization of the educational process. In the course of collecting and interpreting the known data, the authors cite the pedagogical foundations of digital literacy, the current state of digital learning and problems, and the prospects for the development of this direction in the future are…
Descriptors: Digital Literacy, Electronic Learning, Ecology, Educational Trends
Pages: 1  |  ...  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  ...  |  106