Publication Date
In 2025 | 41 |
Since 2024 | 202 |
Since 2021 (last 5 years) | 591 |
Since 2016 (last 10 years) | 1073 |
Since 2006 (last 20 years) | 1429 |
Descriptor
Source
Author
Prinsloo, Paul | 5 |
Boninger, Faith | 4 |
Khalil, Mohammad | 4 |
Lawrence, Cameron | 4 |
Marquardson, Jim | 4 |
Martin, Florence | 4 |
Molnar, Alex | 4 |
Slade, Sharon | 4 |
Whitfield, Christina | 4 |
Celeda, Pavel | 3 |
Chen, Weiqin | 3 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 37 |
Teachers | 32 |
Administrators | 10 |
Researchers | 8 |
Parents | 6 |
Practitioners | 5 |
Students | 5 |
Media Staff | 4 |
Community | 1 |
Support Staff | 1 |
Location
United Kingdom | 33 |
Turkey | 32 |
United States | 28 |
Canada | 25 |
California | 24 |
Australia | 23 |
Texas | 23 |
China | 22 |
Florida | 22 |
European Union | 21 |
India | 19 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yuyu Chen; Yuntao Zou – European Journal of Education, 2024
This research paper focuses on the adoption of multi-perspective theory to study teachers' attitudes and intentions towards using intelligent mixed reality (MR) devices for classroom behaviour analysis. The research model integrates TRI (Technology Readiness Index), IDT (Innovation Diffusion Theory), ECM (Expectation Confirmation Theory) and TAM…
Descriptors: Teacher Attitudes, Educational Quality, Intention, Artificial Intelligence
Indiana Department of Education, 2024
The 2024-2025 Indiana Assessments Policy Manual communicates established guidelines regarding appropriate test administration in Indiana for key stakeholders including educators and Test Coordinators. This document contains policy guidance and appendices that delineate specific aspects of test implementation, including test security protocol,…
Descriptors: Testing, Guidelines, Educational Policy, Standardized Tests
David B. Warner; Lisa McKee – Journal of Cybersecurity Education, Research and Practice, 2024
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity…
Descriptors: Information Security, Privacy, Governance, Compliance (Legal)
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Wibowo Heru Prasetiyo; Beti Indah Sari; Noor Banu Mahadir Naidu; Novitasari Gemi Nurlaili – Education and Information Technologies, 2024
The pervasive presence of the internet in educational environments presents a multiplicity of challenges, particularly in fostering students' responsible and ethical digital citizenship. While existing research investigates digital citizenship, few studies have examined internet skills and computer self-efficacy as mediating factors between…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Technological Literacy
Catherine Adams; Sean Groten – Learning, Media and Technology, 2024
A TechnoEthical Framework for Teachers (TEFT) is introduced to aid educators in selecting and employing educational technologies in ethically sound and pedagogical sensitive ways in their classrooms. TEFT views technology through three key technoethical lenses or perspectives: instrumental, sociomaterial and existential. The instrumental lens is…
Descriptors: Elementary Secondary Education, Technology Uses in Education, Educational Technology, Media Selection
Aurelia Raquel Rodriguez Mandani – ProQuest LLC, 2024
In the context of the rapid expansion of web-integrated technologies, there exists a need for a thorough comprehension of data privacy, emphasizing risk mitigation and the nuanced governance of private data within organizational and regulatory frameworks. Given the rise of privacy regulations such as the GDPR and CCPA, it has become important for…
Descriptors: Information Technology, Information Security, Compliance (Psychology), Privacy
Samantha Fu; Charles Davis; Jesse Rothstein; Aparna Ramesh; Evan White – Grantee Submission, 2022
Linking data together can be a powerful way for governments and researchers alike to tackle vexing public policy research problems. However, for researchers, finding ways to link data directly between two departments can often be more challenging than even obtaining the data in the first place. Even when a researcher develops the necessary…
Descriptors: Data Use, Research Methodology, Researchers, Privacy
Weaver, Bradley W.; Braly, Adam M.; Lane, David M. – Journal of Educational Computing Research, 2021
Phishing emails pose a serious threat to individuals and organizations. Users' ability to identify phishing emails is critical to avoid becoming victims of these attacks. The current study examined the effectiveness of a short online phishing training program designed to help users identify phishing emails. Half of the participants were in the…
Descriptors: Identification, Deception, Electronic Mail, Training
Taha, Nashrawan; Dahabiyeh, Laila – Education and Information Technologies, 2021
The rapid technological developments associated with the decrease in the cost of smartphones made the latter more accessible and convenient to be used. In an educational setting, students are increasingly bringing their smartphones to classrooms, this could have serious security implications, particularly when students are less aware of smartphone…
Descriptors: College Students, Information Security, Knowledge Level, Comparative Analysis
Magnone, Soledad – Global Studies of Childhood, 2021
By 2015, one-third of internet users around the world were under the age of 18, almost half of which were living in the so-called 'Global South'. In light of this, literature from the field of children's online rights has become increasingly critical of the lack of engagement in internet governance discussions globally with the United Nations (UN)…
Descriptors: Foreign Countries, Childrens Rights, Children, Treaties
Desai, Roopa Ramesh; Kim, Jaehoon – Journal of Information Systems Education, 2023
The Internet of Things (IoT) has pervaded practically all aspects of our lives. In this exploratory study, we survey its applications in the field of education. It is evident that technology in general, and, in particular IoT, has been increasingly altering the educational landscape. The goal of this paper is to review the academic literature on…
Descriptors: Internet, Information Technology, Technology Uses in Education, Influence of Technology
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education