Publication Date
In 2025 | 41 |
Since 2024 | 202 |
Since 2021 (last 5 years) | 591 |
Since 2016 (last 10 years) | 1073 |
Since 2006 (last 20 years) | 1429 |
Descriptor
Source
Author
Prinsloo, Paul | 5 |
Boninger, Faith | 4 |
Khalil, Mohammad | 4 |
Lawrence, Cameron | 4 |
Marquardson, Jim | 4 |
Martin, Florence | 4 |
Molnar, Alex | 4 |
Slade, Sharon | 4 |
Whitfield, Christina | 4 |
Celeda, Pavel | 3 |
Chen, Weiqin | 3 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 37 |
Teachers | 32 |
Administrators | 10 |
Researchers | 8 |
Parents | 6 |
Practitioners | 5 |
Students | 5 |
Media Staff | 4 |
Community | 1 |
Support Staff | 1 |
Location
United Kingdom | 33 |
Turkey | 32 |
United States | 28 |
Canada | 25 |
California | 24 |
Australia | 23 |
Texas | 23 |
China | 22 |
Florida | 22 |
European Union | 21 |
India | 19 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Serena Sullivan – ProQuest LLC, 2022
The complexity and frequency of online attacks have been steadily increasing; additional privacy protection and security measures are necessary for individuals to safeguard Personal Identifiable Information (PII). Challenges exist for Trinidad State College (TSC) students to improve online personal privacy protection behaviors. Protective…
Descriptors: Rural Schools, College Students, Privacy, Internet
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Lisa Bosman; Taofeek Oladepo; Ida Ngambeki – Journal of Research in Innovative Teaching & Learning, 2024
Purpose: Upon graduating from university, many engineers will work in new product development and/or technology adoption for continuous improvement and production optimization. These jobs require employees to be cognizant of ethical practices and implications for design. However, little engineering coursework, outside the traditional ABET…
Descriptors: Engineering Education, Ethics, Data, Information Security
Francisco D. Guillén-Gámez; Inmaculada Martínez-García; Enrique Alastor; Lukasz Tomczyk – Computers in the Schools, 2024
The authors have developed a psychometric instrument with the purpose of assessing the digital competencies of teachers in aspects of cybersecurity. From the collection of data, different secondary objectives were carried out: (1) identify if there were significant differences regarding gender; (2) understand if there are significant differences…
Descriptors: Preservice Teachers, Technological Literacy, Internet, Safety
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Leo Van Audenhove; Lotte Vermeire; Wendy Van den Broeck; Andy Demeulenaere – Information and Learning Sciences, 2024
Purpose: The purpose of this paper is to analyse data literacy in the new Digital Competence Framework for Citizens (DigComp 2.2). Mid-2022 the Joint Research Centre of the European Commission published a new version of the DigComp (EC, 2022). This new version focusses more on the datafication of society and emerging technologies, such as…
Descriptors: Data Analysis, Data Collection, Information Literacy, Foreign Countries
Bodnar, Richard Carl – ProQuest LLC, 2021
Evidence suggests that adherence to information security policies is one of the best and most cost-effective ways to protect an organization. Much of the current research suggests that user behavior is often to blame for vulnerabilities being exploited. Employees that have a high level of information security awareness appear to perform well…
Descriptors: Information Security, Compliance (Legal), Higher Education, Measures (Individuals)
Annette Bamberger; Tien-Yin Huang – Journal of Education Policy, 2025
This paper analyses the EU's approach to international research cooperation between 2012-2022 drawing on critical geopolitical perspectives and the spatial politics of (re)bordering. It identifies two periods which represent the EU's shifting approaches to international research cooperation from the pursuit of a liberal agenda promoting…
Descriptors: Foreign Countries, Neoliberalism, International Cooperation, Research Administration
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Torres-Hernández, Norma; Gallego-Arrufat, María-Jesús – Contemporary Educational Technology, 2023
The protection of personal data and privacy are important issues closely related to use of social media, information and communication technologies, and the Internet in the area of education. The treatment of academic information and use of tools and programs for instruction, communication, and learning have revealed the handling of a significant…
Descriptors: Preservice Teachers, Information Security, Elementary Education, Teacher Attitudes
Haque, Mustafizul; Kumar, V. Vijaya; Singh, Preeti; Goyal, Adheer A.; Upreti, Kamal; Verma, Ankit – Education and Information Technologies, 2023
Now a days with the rapidly increasing development of technology and communication system, the implementation of blockchain is continuously increasing in various sectors. With the increase in massive data in educational sectors there arise a requirement of handling such enormous data. This can be easily and securely handled by blockchain…
Descriptors: Meta Analysis, Information Technology, Technology Uses in Education, Technology Integration
Gümüs, Muhammed Murat; Çakir, Recep; Korkmaz, Özgen – Education and Information Technologies, 2023
Today, with digital technologies being in every aspect of our lives, cyberbullying and digital ethics, and digital security violations are emerging as concepts that threaten our digital world. It is thought that displaying ethical behavior and providing digital security in digital environments can increase sensitivity to cyberbullying. Here, it is…
Descriptors: Preservice Teachers, Bullying, Computer Mediated Communication, Ethics
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns