Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 10 |
| Since 2007 (last 20 years) | 23 |
Descriptor
| Computer Networks | 23 |
| Privacy | 23 |
| Computer Security | 15 |
| Internet | 12 |
| Information Technology | 9 |
| Telecommunications | 8 |
| Foreign Countries | 7 |
| Higher Education | 7 |
| Information Security | 7 |
| College Students | 6 |
| Computer Software | 6 |
| More ▼ | |
Source
Author
| Panettieri, Joseph C. | 2 |
| Zhao, Sherry Y. | 2 |
| Ainsworth, Shaaron | 1 |
| Almeroth, Kevin | 1 |
| Anderson, Sharolyn | 1 |
| Bell, Kevin R. | 1 |
| Ben-Jacob, Marion G. | 1 |
| Bristow, Rob | 1 |
| Buda, Marie | 1 |
| Crook, Charles | 1 |
| Daugherty, Michael K. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 20 |
| Reports - Descriptive | 13 |
| Reports - Research | 8 |
| Tests/Questionnaires | 2 |
| Collected Works - Proceedings | 1 |
| Guides - General | 1 |
| Guides - Non-Classroom | 1 |
Education Level
| Higher Education | 12 |
| Postsecondary Education | 5 |
| Elementary Secondary Education | 3 |
| Secondary Education | 1 |
| Two Year Colleges | 1 |
Audience
| Administrators | 2 |
| Parents | 1 |
| Policymakers | 1 |
| Teachers | 1 |
Location
| Australia | 3 |
| Ohio | 3 |
| Connecticut | 2 |
| Israel | 2 |
| Massachusetts | 2 |
| Netherlands | 2 |
| United Kingdom | 2 |
| United States | 2 |
| Arkansas | 1 |
| Asia | 1 |
| Brazil | 1 |
| More ▼ | |
Laws, Policies, & Programs
| Digital Millennium Copyright… | 1 |
| Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Fazlyn Petersen – Perspectives in Education, 2025
In times of increasing civil unrest and displacement, ensuring the continuity of education necessitates innovative solutions. This article advocates for the use of data-free applications to prevent educational exclusion. It examines the challenges faced by displaced and marginalised students, including disrupted educational infrastructure, limited…
Descriptors: Computer Software, Access to Education, Social Justice, Disadvantaged
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations
Office of Educational Technology, US Department of Education, 2017
This guide provides practical, actionable information intended to help both technical personnel and educational leaders navigate the many decisions required to deliver broadband connectivity to students. It presents a variety of options for school and district leaders to consider when making technology infrastructure decisions, recognizing that…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, School Districts
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Previous Page | Next Page ยป
Pages: 1 | 2
Peer reviewed
Direct link
