NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 91 to 105 of 1,479 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Stinne Glasdam; Katharina Ó. Cathaoir; Sigrid Stjernswärd – Journal of Academic Ethics, 2025
International research collaborations engage multiple countries, researchers, and universities. This enhances the magnitude of contextual challenges, including legal and ethical dimensions across various jurisdictions, that must be bridged in qualitative research regardless of discipline, also in the construction of informed consents. From a…
Descriptors: Foreign Countries, Legal Problems, Ethics, Informed Consent
Peer reviewed Peer reviewed
Direct linkDirect link
Garg, Anuj; A., Sharmila; Kumar, Pramod; Madhukar, Mani; Loyola-González, Octavio; Kumar, Manoj – Education and Information Technologies, 2022
Nowadays, internet technology plays a vital role in all the fields of our daily lives ranging from the world economy, professional careers, higher education, and almost all the spheres that are deeply impacted. In the current situation, due to COVID-19, the dependence on the Internet for almost everything, including learning, getting daily needs,…
Descriptors: Internet, Electronic Learning, Online Courses, Educational Quality
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Xinran Wang – European Journal of Education (EJED), 2022
The focus of this research was to look into the information security awareness of Chinese university students during the COVID-19 pandemic and make recommendations based on the survey's findings and research literature. The quantitative method is applied in this study. 111 Chinese college students were randomly sampled and requested to answer a…
Descriptors: Foreign Countries, College Students, Knowledge Level, Information Security
Jamaine Mungo – ProQuest LLC, 2022
The purpose of this generic qualitative inquiry research study is to examine the features that need to be improved in self-paced cybersecurity awareness training to educate retail employees to identify phishing attacks. Malicious phishing attacks are a significant threat to retail corporations' business operations and confidential data. Employees'…
Descriptors: Computer Security, Information Security, Training, Employees
Jing Ma – ProQuest LLC, 2024
This study investigated the impact of scoring polytomous items later on measurement precision, classification accuracy, and test security in mixed-format adaptive testing. Utilizing the shadow test approach, a simulation study was conducted across various test designs, lengths, number and location of polytomous item. Results showed that while…
Descriptors: Scoring, Adaptive Testing, Test Items, Classification
Clarence Okoh – Center for Law and Social Policy, Inc. (CLASP), 2024
As the infrastructure of police surveillance grows in public schools, communities must be prepared to safeguard the rights and freedoms of students and families. This report is designed to help youth justice advocates, youth leaders, educators, caregivers, and policymakers understand and challenge the impact of school surveillance, data…
Descriptors: Youth, Artificial Intelligence, Student Rights, Disclosure
Peer reviewed Peer reviewed
Direct linkDirect link
Juliana Elisa Raffaghelli; Marc Romero Carbonell; Teresa Romeu-Fontanillas – Information and Learning Sciences, 2024
Purpose: It has been demonstrated that AI-powered, data-driven tools' usage is not universal, but deeply linked to socio-cultural contexts. The purpose of this paper is to display the need of adopting situated lenses, relating to specific personal and professional learning about data protection and privacy. Design/methodology/approach: The authors…
Descriptors: Artificial Intelligence, Data Collection, Information Literacy, Intervention
Patrick Ward – ProQuest LLC, 2024
This proposal is to develop a framework for designing a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges such as program accreditation, workforce development, and Department of Homeland Security/National Security Agency…
Descriptors: Community Colleges, College Programs, Computer Security, Internet
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Zhen Xu; Kara M. Dawson; Pavlo D. Antonenko; Do Hyong Koh; Minyoung Lee; Amber E. Benedict; Swarup Bhunia – Journal of Research on Technology in Education, 2024
This article describes the use of a comic book to anchor a cryptology and cybersecurity curriculum for upper elementary students. Perceptions about the comic book from 138 students across 11 afterschool programs were examined using survey, classroom observation, and interviews. Data analysis revealed that the comic book created a…
Descriptors: Technology, Computer Security, Information Security, Cartoons
Peer reviewed Peer reviewed
Direct linkDirect link
Héctor Galindo-Domínguez; María José Bezanilla; Lucía Campo – Education and Information Technologies, 2025
Although part of their use is intended for leisure, social networks could be a useful tool for developing students' critical thinking. Nevertheless, this relationship could also be influenced by our competence in learning to learn, that is to say, our knowledge, skills, and attitudes associated with self-regulation, metacognition, use of learning…
Descriptors: Social Media, College Students, Critical Thinking, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Rohani Rohan; Wichian Chutimaskul; Rita Roy; Jari Hautamäki; Suree Funilkul; Debajyoti Pal – Education and Information Technologies, 2025
The field of information security is experiencing growing popularity within Higher Education Institutions (HEIs), reflecting the increasing recognition of its importance in safeguarding sensitive data, and mitigating cyber risks. This shift highlights the critical need for effective security practices within educational environments, where data…
Descriptors: Test Construction, Information Security, Stakeholders, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ece Gumusel – Journal of Education for Library and Information Science, 2025
The rapid advancement of technology has presented marginalized communities in libraries with numerous privacy and security challenges. Many researchers have emphasized the importance of Privacy-Enhancing Technologies (PETs), suggesting that these technical solutions can effectively assist users in safeguarding their personally identifiable…
Descriptors: Privacy, LGBTQ People, College Students, Information Science Education
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  99