Publication Date
In 2025 | 41 |
Since 2024 | 202 |
Since 2021 (last 5 years) | 591 |
Since 2016 (last 10 years) | 1073 |
Since 2006 (last 20 years) | 1429 |
Descriptor
Source
Author
Prinsloo, Paul | 5 |
Boninger, Faith | 4 |
Khalil, Mohammad | 4 |
Lawrence, Cameron | 4 |
Marquardson, Jim | 4 |
Martin, Florence | 4 |
Molnar, Alex | 4 |
Slade, Sharon | 4 |
Whitfield, Christina | 4 |
Celeda, Pavel | 3 |
Chen, Weiqin | 3 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 37 |
Teachers | 32 |
Administrators | 10 |
Researchers | 8 |
Parents | 6 |
Practitioners | 5 |
Students | 5 |
Media Staff | 4 |
Community | 1 |
Support Staff | 1 |
Location
United Kingdom | 33 |
Turkey | 32 |
United States | 28 |
Canada | 25 |
California | 24 |
Australia | 23 |
Texas | 23 |
China | 22 |
Florida | 22 |
European Union | 21 |
India | 19 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Silva-Robles, Rigoberto; Dutton-Treviño, Harold Sidney – Teaching Public Administration, 2023
The purpose of this work is to provide empirical evidence as to how state level Freedom of Information or Access to Information and data protection regulator bodies in Mexico carry out their training tasks. We use different theoretical assumptions, particularly those that refer to the idea of "training in the public sector" regarding two…
Descriptors: Foreign Countries, Access to Information, Information Security, Public Administration Education
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Nur Suhaili Mansor; Hapini Awang; Ramlan Mustapha; Nurul Izzah Mohamad Ghozali – Online Submission, 2023
This study explores the current understanding of data security among students within the Malaysian higher education system. The focus is on evaluating how well the respondents grasp two critical aspects: knowledge related to securing social media platforms and a broader comprehension of data security measures. To gather insights, a meticulously…
Descriptors: College Students, Foreign Countries, Social Media, Information Security
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
Blackmon, Stephanie J. – Change: The Magazine of Higher Learning, 2023
Student privacy is a critical area of higher education that deserves greater focus, particularly as student data digitalization increases. Many colleges and universities use data literacy as a way to prepare students, sometimes from different disciplines, to work with others' data postgraduation. Data literacy can be an avenue for helping all…
Descriptors: Privacy, Data Collection, Data Use, Higher Education
Baig, Maria Ijaz; Yadegaridehkordi, Elaheh; Shuib, Liyana; Sallehuddin, Hasimi – Education and Information Technologies, 2023
Even though big data offers new opportunities to organizations, big data adoption (BDA) is still in the early stages of introduction, and its determinants remain unclear in many sectors. Therefore, this research intended to identify the determinants of BDA in the education sector. A theoretical model was developed based on the integration of the…
Descriptors: Foreign Countries, Learning Analytics, Higher Education, Structural Equation Models
Indiana Department of Education, 2024
The 2023-2024 Indiana Assessments Policy Manual communicates established guidelines regarding appropriate test administration in Indiana for key stakeholders including educators and Test Coordinators. This document contains policy guidance and appendices that delineate specific aspects of test implementation, including test security protocol,…
Descriptors: Testing, Guidelines, Educational Policy, Standardized Tests
M. Claire Buchan; Jasmin Bhawra; Tarun Reddy Katapally – Smart Learning Environments, 2024
The rapid expansion of digital connectivity has provided youth with wide-ranging access to digital platforms for communication, entertainment, and education. In light of this profound shift, there have been growing concerns about online safety, data privacy, and cybersecurity. A critical factor influencing the ability of youth to responsibly…
Descriptors: Digital Literacy, Program Implementation, Measures (Individuals), Foreign Countries
Siyuan Ma; Yin Wang; Zeng Shu; Zening Duan; Lin Sun – Education and Information Technologies, 2024
The paper aims to develop and validate an internet literacy scale for high school students. The study emphasizes the importance of internet literacy, especially for adolescents who need sufficient internet literacy to gain self-development and live their whole lives in this information age. The study has recruited 744 high school students and…
Descriptors: High School Students, Technological Literacy, Internet, Measures (Individuals)
Julio Cabero-Almenara; Raquel Barragán-Sánchez; Carmen Llorente-Cejudo; Antonio Palacios-Rodríguez – Computers in the Schools, 2024
This study examines future teachers' self-perception regarding competences related to the environmental impact of digital technologies. The sample includes 1948 participants (235 men and 1713 women) selected through incidental sampling from the Faculty of Education Sciences at the University of Seville. The validated instrument used was the…
Descriptors: Foreign Countries, Universities, Measures (Individuals), Sustainability
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Mohammad Mansour Khasawneh – Knowledge Management & E-Learning, 2025
The study aims to investigate the impact of e-learning readiness on faculty's performance in their academic works. It also seeks to examine how their information security awareness and technology self-efficacy mediate this primary effect. Due to the COVID-19 pandemic, many academic institutions around the world have closed; and adopted online…
Descriptors: Electronic Learning, Educational Technology, Readiness, Information Security
Prinsloo, Paul; Kaliisa, Rogers – British Journal of Educational Technology, 2022
Whilst learning analytics is still nascent in most African higher education institutions, many African higher education institutions use learning platforms and analytic services from providers "outside" of the African continent. A critical consideration of the protection of data privacy on the African continent and its implications for…
Descriptors: Foreign Countries, Information Security, Privacy, Data
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security