NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 376 to 390 of 1,585 results Save | Export
Victor Ramon Arenas – ProQuest LLC, 2021
Cybersecurity faculty do not have the time to respond to the rapid and pervasive cybersecurity academic landscape. For faculty to respond to this challenge, they are expected to continuously adapt to remain competitive. The purpose of this descriptive phenomenological study was to explore the cybersecurity faculty's perceptions of their need to…
Descriptors: Course Content, Computer Security, Professional Education, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Valcourt, Scott A. – ProQuest LLC, 2017
The Science DMZ is a network research tool offering superior large science data transmission between two locations. Through a network design that places the Science DMZ at the edge of the campus network, the Science DMZ defines a network path that avoids packet inspecting devices (firewalls, packet shapers) and produces near line-rate transmission…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Payne, Brian K.; Paredes, Tisha; Cross, Bria – Education, 2020
This qualitative study assesses students' perceptions about electronic portfolios. A survey including two open-ended questions focusing on what students learned and what they would recommend to others about electronic portfolios was administered to current enrolled students majoring in criminal justice, cybersecurity, or leadership. We analyzed…
Descriptors: Student Attitudes, Portfolios (Background Materials), Electronic Publishing, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Burrell, Darrell Norman; Courtney-Dattola, Ashley; Burton, Sharon L.; Nobles, Calvin; Springs, Delores; Dawson, Maurice E. – International Journal of Information and Communication Technology Education, 2020
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own…
Descriptors: Internet, Instructional Improvement, Information Technology, Computer Security
Emerick, Gerald John – ProQuest LLC, 2020
Despite the strong, global demand for talented workers, higher than average salaries, and relatively low education requirements (bachelor's degree) for computing fields such as cybersecurity, there continues to be a pipeline issue with graduating enough workers educated in cybersecurity to fill the demand in the United States and globally…
Descriptors: Computer Security, Information Security, Career Choice, Influences
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Florence; Gezer, Tuba; Wang, Wei Chao; Petty, Teresa; Wang, Chuang – Journal of Research on Technology in Education, 2022
Digital citizenship refers to exhibiting responsible digital habits to function in a digital world. The purpose of this mixed methods study is to examine K-12 educators' experiences based on a digital citizenship graduate-level course that they participated in for professional development. Forty-five educators participated in this course. In…
Descriptors: Elementary Secondary Education, Teaching Experience, Graduate Study, Faculty Development
Aljuaid, Alanoud – ProQuest LLC, 2022
There is a workforce shortage and a huge gender disparity in the cybersecurity profession globally and Saudi Arabia. Enabling women to access these opportunities involves bolstering training and implementing reforms to give women the go-ahead to access these opportunities. With only a paltry 5% of women being in cybersecurity in the Middle East…
Descriptors: Foreign Countries, Gender Differences, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Peer reviewed Peer reviewed
Direct linkDirect link
Kong, Siu-Cheung; Ma, Yunsi Tina – International Journal of Distance Education Technologies, 2022
The current study aims to analyse school leaders' understanding and expectation of, and support for, online teaching and learning during and after the outbreak of the COVID-19 pandemic. Based on the theory of reasoned action (TRA) framework, the authors designed a questionnaire and collected 319 responses from school principals about their views…
Descriptors: Administrator Attitudes, Principals, Online Courses, COVID-19
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Dana Kube; Sebastian Gombert; Brigitte Suter; Joshua Weidlich; Karel Kreijns; Hendrik Drachsler – Journal of Computer Assisted Learning, 2024
Background: Gender stereotypes about women and men are prevalent in computer science (CS). The study's goal was to investigate the role of gender bias in computer-supported collaborative learning (CSCL) in a CS context by elaborating on gendered experiences in the perception of individual and team performance in mixed-gender teams in a hackathon.…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Gender Issues, Learning Activities
Keith Lee; Evo Popof; Chris Reykdal, Contributor – State Educational Technology Directors Association, 2024
The 2023-24 school year was a big year for educational technology. As the world of educational technology has evolved, so has SETDA's State EdTech Trends Survey. This year's survey and report feature new questions (which will likely become recurring questions) and some changes to old questions to reflect the mainstreaming of AI in K-12 education.…
Descriptors: Educational Technology, Educational Trends, Technology Uses in Education, Artificial Intelligence
Pages: 1  |  ...  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  30  |  ...  |  106