Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Lingelbach, Kembley K. – ProQuest LLC, 2018
Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the…
Descriptors: Females, Computer Security, Information Security, Self Efficacy
Lester, Teresa M. – ProQuest LLC, 2018
The purpose of this mixed-methods investigation was to determine how teachers and parents understood and educated themselves on cyber safety. This research explored how teachers and parents found and used resources available to stay informed of the constant threats and changes for students while online. The amount of time young people spend with…
Descriptors: Computer Security, Information Security, Teacher Attitudes, Parent Attitudes
Essig, Rebecca R.; Elahi, Behim; Hunter, Jennifer L.; Mohammadpour, Atefeh; O'Connor, Kimberly W. – Journal of STEM Outreach, 2020
"Future Girls of STEM" is a university-sponsored, summer camp outreach program that was designed and implemented by an all-female faculty group to increase young girls' interest in pursuing future careers in science, technology, engineering, and mathematics (STEM). This paper discusses the logistics and results of the pilot Future Girls…
Descriptors: Females, Camps, STEM Education, Engineering
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Wheeler, Anne Marie; Bertram, Burt – American Counseling Association, 2019
This eighth edition provides a current and comprehensive discussion of counselors' legal and ethical responsibilities, an examination of state and federal laws as they relate to practice, and helpful risk management strategies. Attorney Nancy Wheeler and Burt Bertram, a private practitioner and counselor educator, offer real-world practical tips…
Descriptors: School Counselors, School Counseling, Legal Responsibility, Ethics
National Forum on Education Statistics, 2022
Digital inequity has been a long-standing issue in the education community. A lack of home internet and technology devices can not only hinder students' ability to access educational resources at home, but can also have a detrimental effect on student achievement. Education agencies have taken steps over the past decades to address digital…
Descriptors: Access to Computers, Technology Uses in Education, Educational Technology, Internet
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
Yang, Samuel C.; Wen, Bo – Journal of Education for Business, 2017
With the increasing demand for cybersecurity professionals, the authors examined how business schools are meeting that demand, specifically the core requirements of their cybersecurity curricula related to information systems programs. They examined 518 Association to Advance Collegiate Schools of Business-accredited business schools in the United…
Descriptors: Business Schools, Computer Security, College Curriculum, Undergraduate Study
Gupta, Deepty; Surbhi – Journal of Educational Technology, 2018
Information and Communication Technology (ICT) has provided the better learning opportunities to the present teachers and learners across the world. In the era of internet, many educational resources are free and lot of free softwares are also available. In our country the basic operating system used in educational institutions are proprietary in…
Descriptors: Open Source Technology, Computer Software, Barriers, Online Courses
Eckerly, Carol; Smith, Russell; Sowles, John – Practical Assessment, Research & Evaluation, 2018
The Discrete Option Multiple Choice (DOMC) item format was introduced by Foster and Miller (2009) with the intent of improving the security of test content. However, by changing the amount and order of the content presented, the test taking experience varies by test taker, thereby introducing potential fairness issues. In this paper we…
Descriptors: Culture Fair Tests, Multiple Choice Tests, Testing, Test Items
Harrison, Brynne – ProQuest LLC, 2018
Phishing has become a preferred method among cyber criminals looking to gain access to confidential information. Although most businesses and governmental organizations provide employees with some sort of cyber security training, there is a lack of research examining whether such training methods work to actually reduce susceptibility to…
Descriptors: Training Methods, Information Security, Computer Security, Money Management