NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Nataliia Telendii – ProQuest LLC, 2023
Education is a constantly evolving field that requires continuous professional development. While policymakers continue to implement school reforms, many of them depend on teachers' ability to learn and improve instruction to increase student learning. Teachers have a double role in educational reforms by being simultaneously subjects and objects…
Descriptors: Faculty Development, Program Design, Program Effectiveness, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics