NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 61 to 75 of 1,416 results Save | Export
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Catal, Cagatay; Ozcan, Alper; Donmez, Emrah; Kasif, Ahmet – Education and Information Technologies, 2023
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an…
Descriptors: Computer Security, Information Security, College Programs, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Bashir, Faiza; Warraich, Nosheen Fatima – Interactive Learning Environments, 2023
The study intends to identify the emerging themes of e-learning through the Semantic Web. To highlight the key challenges and explore the core benefits of this mesmerizing technology was another goal of the study. To get the set goals researchers systematically reviewed the literature in five leading databases, out of which one specialized…
Descriptors: Electronic Learning, Technology Uses in Education, Internet, Semantics
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2023
Safe, secure, resilient, and accessible education system infrastructure, both physical and digital, is an essential factor for success. Yet, the digital infrastructure in the nation's K-12 schools is increasingly under threat from malicious cyber actors. This fact sheet: (1) describes the most common types of cyber threats currently facing school…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Birgy Lorenz – Educational Media International, 2023
The proportion of women in the IT sector is decreasing. In schools, girls tend to stay away from IT or take on roles in softer activities such as digital safety, social media. Studying and working in IT requires technical skillset. At the same time, the sector would need people with people and organizational skills as well. Technical skills can be…
Descriptors: Females, Role Models, Information Technology, Foreign Countries
Ali Nusair – ProQuest LLC, 2023
As the digital revolution unfolds, individuals are increasingly transforming their traditional homes into smart homes, adopting semi- and fully automated smart devices. This transformative shift, fueled by advancements in information technology, presents vast social and economic opportunities. Despite the burgeoning number of smart devices in the…
Descriptors: Internet, Information Technology, Information Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Garg, Anuj; A., Sharmila; Kumar, Pramod; Madhukar, Mani; Loyola-González, Octavio; Kumar, Manoj – Education and Information Technologies, 2022
Nowadays, internet technology plays a vital role in all the fields of our daily lives ranging from the world economy, professional careers, higher education, and almost all the spheres that are deeply impacted. In the current situation, due to COVID-19, the dependence on the Internet for almost everything, including learning, getting daily needs,…
Descriptors: Internet, Electronic Learning, Online Courses, Educational Quality
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Xinran Wang – European Journal of Education (EJED), 2022
The focus of this research was to look into the information security awareness of Chinese university students during the COVID-19 pandemic and make recommendations based on the survey's findings and research literature. The quantitative method is applied in this study. 111 Chinese college students were randomly sampled and requested to answer a…
Descriptors: Foreign Countries, College Students, Knowledge Level, Information Security
Jamaine Mungo – ProQuest LLC, 2022
The purpose of this generic qualitative inquiry research study is to examine the features that need to be improved in self-paced cybersecurity awareness training to educate retail employees to identify phishing attacks. Malicious phishing attacks are a significant threat to retail corporations' business operations and confidential data. Employees'…
Descriptors: Computer Security, Information Security, Training, Employees
Peer reviewed Peer reviewed
Direct linkDirect link
Labaran Isiaku; Ahmet Adalier – On the Horizon, 2025
Purpose: This study aims to investigate the challenges associated with the integration and implementation of blockchain technology in the education sector. The primary objective is to identify and categorize these challenges using the Technology-Organization-Environment (TOE) framework, shedding light on the technological, organizational and…
Descriptors: Literature Reviews, Technology Uses in Education, Information Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Charlotte Z. Mann; Adam C. Sales; Johann A. Gagnon-Bartsch – Grantee Submission, 2025
Combining observational and experimental data for causal inference can improve treatment effect estimation. However, many observational data sets cannot be released due to data privacy considerations, so one researcher may not have access to both experimental and observational data. Nonetheless, a small amount of risk of disclosing sensitive…
Descriptors: Causal Models, Statistical Analysis, Privacy, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Estel·la Ramírez-Baraldes; Daniel García-Gutiérrez; Cristina García-Salido – European Journal of Education, 2025
To explore the opportunities and challenges of artificial intelligence (AI) in nursing and its impact. Bibliographic review using Arksey and O'Malley's framework, enhanced by Levac, Colquhoun and O'Brien and following PRISMA guidelines, including qualitative and mixed studies. MeSH terms and keywords such as nursing education and ethical…
Descriptors: Artificial Intelligence, Nursing, Nursing Education, Barriers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paula Cristina R. Azevedo; Christine B. Valadez – Impacting Education: Journal on Transforming Professional Practice, 2025
Artificial Intelligence (AI) has seen a significant rise in public use since the release of ChatGPT in November of 2022. Higher education institutions (HEI) have struggled to negotiate how best to manage AI technologies within their academic communities, acknowledging both positive and negative impacts of AI on education. Focused primarily on…
Descriptors: Higher Education, Artificial Intelligence, Technology Uses in Education, Educational Policy
Jing Ma – ProQuest LLC, 2024
This study investigated the impact of scoring polytomous items later on measurement precision, classification accuracy, and test security in mixed-format adaptive testing. Utilizing the shadow test approach, a simulation study was conducted across various test designs, lengths, number and location of polytomous item. Results showed that while…
Descriptors: Scoring, Adaptive Testing, Test Items, Classification
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  95