NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 886 to 900 of 1,589 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L. – Educational Gerontology, 2010
Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…
Descriptors: Internet, Gender Differences, Older Adults, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan – International Journal of Distance Education Technologies, 2011
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
Descriptors: Electronic Learning, Concept Mapping, Learning Processes, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
DeSantis, Nick – Chronicle of Higher Education, 2012
College campuses are hothouses of data, including course schedules, degree requirements, and grades. But much of the information remains spread out across software systems or locked on university servers. Start-up companies want to pry the information loose from campus servers in order to offer personalized services that could transform the…
Descriptors: Higher Education, Campuses, Grades (Scholastic), Scores
Sutton, Susan – Principal Leadership, 2009
This article offers solutions and steps to prevent cyberbullying. Schools can improve their ability to handle cyberbullying by educating staff members, students, and parents and by implementing rules and procedures for how to handle possible incidents. Among the steps is to include a section about cyberbullying and expectations in the student…
Descriptors: Bullying, Internet, Synchronous Communication, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2009
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Descriptors: Internet, School Districts, Computer Software, Web Sites
Fredrick, Kathy – School Library Media Activities Monthly, 2009
A basic definition of "cyberbullying" is provided by Nancy Willard, director of the Center for Safe and Responsible Internet Use. She has defined cyberbullying as using the Internet or other mobile devices to send or post harmful or cruel text or images to bully others. The advent of social networking has highlighted cyberbullying. Library media…
Descriptors: Media Specialists, Internet, Library Role, Bullying
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Clarke, Marlon – ProQuest LLC, 2011
As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors…
Descriptors: Technical Support, Individual Characteristics, Self Efficacy, Focus Groups
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Pereira, Roberto; Baranauskas, M. Cecilia C.; da Silva, Sergio Roberto P. – Educational Technology & Society, 2013
Social software is a growing reality worldwide and several authors are discussing its use to promote social interaction in learning contexts. Although problems regarding privacy, reputation, and identity are commonly reported in social software, an explicit concern regarding peoples' values is not a common practice in its design and adoption,…
Descriptors: Social Networks, Computer Software, Semiotics, Values
Ackerman, Amy S.; Krupp, Melissa L. – International Association for Development of the Information Society, 2012
Although school budgets have plummeted due to federal and state funding reductions, adopting Bring Your Own Technology (BYOT), may address monetary tightening while simultaneously infusing 21st century learning. Implementing BYOT may provide real, rigorous, and relevant learning for the students while posing higher-order thinking questions from…
Descriptors: Foreign Countries, Influence of Technology, Technology Uses in Education, Computer Security
Pages: 1  |  ...  |  56  |  57  |  58  |  59  |  60  |  61  |  62  |  63  |  64  |  ...  |  106