Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Tout, Hicham – ProQuest LLC, 2013
The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning…
Descriptors: Electronic Mail, Predictive Validity, Accuracy, Artificial Intelligence
Lamb, Christopher J. – ProQuest LLC, 2013
The Advanced Persistent Threat (APT) presents an ever present and more growing threat to organizations across the globe. Traditional Information Technology (IT) incident response falls short in effectively addressing this threat. This researcher investigated the use of single-loop and double-loop learning in two organizations with internal…
Descriptors: Learning, Case Studies, Information Technology, Computer Security
Brooks, Tyson T. – ProQuest LLC, 2013
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
Descriptors: Risk Management, Computer Security, Computer Software, Computer Networks
Houghton, Robert F. – ProQuest LLC, 2013
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
Descriptors: Information Technology, Computer Security, Models, Interviews
Goertler, Senta; Gacs, Adam – Unterrichtspraxis/Teaching German, 2018
As online educational programs and courses increase (Allen & Seaman, [Allen, I. E., 2014]), it is important to understand the benefits and limitations of this delivery format when assessing students and when comparing learning outcomes. This article addresses the following two questions: (1) What are some of the best practices in assessing…
Descriptors: Online Courses, Second Language Instruction, Second Language Learning, German
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Executive Office of the President, 2016
Advances in Artificial Intelligence (AI) technology have opened up new markets and new opportunities for progress in critical areas such as health, education, energy, and the environment. In recent years, machines have surpassed humans in the performance of certain specific tasks, such as some aspects of image recognition. Experts forecast that…
Descriptors: Artificial Intelligence, Federal Government, Federal Regulation, Research and Development
Mahalingam, Sheila; Abdollah, Mohd Faizal; bin Sahibuddin, Shahrin – International Journal of Distance Education Technologies, 2014
Mobile Learning has a potential to improve efficiency in the education sector and expand educational opportunities to underserved remote area in higher learning institutions. However there are multi challenges in different altitude faced when introducing and implementing m-learning. Despite the evolution of technology changes in education,…
Descriptors: Electronic Learning, Computer Security, Reliability, Computer System Design
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Computer Security
Croft, Michelle – ACT, Inc., 2014
Given the transition from paper-and-pencil to computer administration, policymakers must update test security laws and policies to reflect the new threats to administration. There will likely always be a need for paper-and-pencil test administration security laws and policies, given that paper test copies may be needed as an accommodation or may…
Descriptors: Computer Assisted Testing, Computer Security, Information Security, Laws
Dittrich, David – Research Ethics, 2015
This paper considers some of the ethical issues surrounding the study of malicious activity in social networks, specifically using a technique known as "social honeypots" combined with the use of deception. This is a potentially touchy area of study that is common to social and behavioral research that is well understood to fall within…
Descriptors: Social Networks, Social Media, Ethics, Deception
Michelle Tolbert; Jordan Hudson; Heather Claussen Erwin – Office of Career, Technical, and Adult Education, US Department of Education, 2015
This report is designed to inform federal, state, and local corrections and correctional education administrators as they explore ways to securely and cost-effectively provide advanced technologies in corrections facilities to help strengthen and expand educational and reentry services. It describes the current status of these technologies in…
Descriptors: Correctional Education, Technology Integration, Educational Technology, Administrators
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence
Kansu, Ceren Çevik; Öksüz, Yücel – Journal of Education and Training Studies, 2019
This study was aimed to determine of their perceptions and levels of digital citizenship for pre-service classroom teachers. The study was conducted with 76 senior pre-service classroom teachers at Education Faculty of B. U. The study is survey research. In this research, "The Digital Citizenship Scale" developed by Kocadag (2012) was…
Descriptors: Preservice Teachers, Student Attitudes, Technological Literacy, Information Technology
Murphy, Colleen F. – ProQuest LLC, 2018
By 2020, the global need for information security professionals is expected to reach six million and the shortfall in meeting that need is expected to be over one and a half million. Not only is there a shortage of cybersecurity professionals but those who are graduates of a cybersecurity program are not adequately skilled to assume significant…
Descriptors: Instructional Design, Computer Security, Information Security, Labor Force Development