NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 202556
Since 2017 (last 10 years)56
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 56 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Mahao Mahao; Julia Chere-Masopha – Discourse and Communication for Sustainable Education, 2025
Digital literacy has become crucial for functionality and productivity in academics, work, and everyday community lives. However, easy access to digital technologies, accompanied by limited digital literacy, can expose users to the dangers that lurk in the digital world. Young people, who are frequent users of these technologies yet have less…
Descriptors: Student Teachers, Student Attitudes, Computer Security, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oumaima Ouadoud; Tarik Chafiq; Ahmed Eddaoui – Educational Process: International Journal, 2025
Background/purpose. This research was conducted to address the growing need for more secure, transparent, and efficient solutions for the issuance and management of university degrees. The main purpose of the study is to evaluate which Blockchains are best suited for this application, aiming to enhance the reliability and speed of degree-related…
Descriptors: Academic Degrees, Technology Uses in Education, Computer Security, Academic Records
Peer reviewed Peer reviewed
Direct linkDirect link
Marian Horváth; Marek Hlásny; Slávka Krásna – Acta Educationis Generalis, 2025
Introduction: The digital era is reshaping not only technology and economy but also the legal systems governing democratic societies. The rapid emergence of artificial intelligence, big data, and digitisation calls for proactive adaptation of legal frameworks. This article explores the intersection of digital transformation and the rule of law,…
Descriptors: Democracy, Laws, Artificial Intelligence, Governance
Peer reviewed Peer reviewed
Ishrat Ahmed; Paul Alvarado; Siddharth Jain; Tracy Arner; Elizabeth Reilley; Danielle S. McNamara – Grantee Submission, 2025
The rapid evolution of artificial intelligence (AI) has created an unprecedented opportunity for innovation across industries, but its complexity often presents a steep learning curve for many (Roberts & Candi, 2024; Gunner, 2025). This highlights the need for user-friendly tools that bridge the gap between AI's potential and its practical…
Descriptors: State Universities, Artificial Intelligence, Usability, Innovation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Kaie Maennel; Olaf Maennel – ACM Transactions on Computing Education, 2025
The human aspects of cyber security are fundamental as these are interlinked with processes and technology in building resilience against an evolving and complex threat landscape. It is vital to teach future cyber security specialists sufficient knowledge about human aspects in order to strengthen the defences and defend against malicious actors.…
Descriptors: Computer Security, Computer Science Education, College Curriculum, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Tang Wee Teo; Sherwin John San Buenaventura Mabulo; Kim Chwee Daniel Tan; Jin Xin Matilda Ho; Xue Xian Thea Tan – Journal of Science Education and Technology, 2025
STEM (science, technology, engineering, mathematics) hackathons have been conducted to offer opportunities for diverse participants to work collaboratively and intensely on tasks within a short period. However, most literature about hackathons does not offer theoretical discussions on the affordances of such learning contexts for school students.…
Descriptors: Epistemology, STEM Education, Computer Security, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Kara Dawson; Zhen Xu; Pavlo Antonenko; DoHyong Koh – Journal of Science Education and Technology, 2025
Online professional development (OPD) is a popular professional learning option, especially for those with monetary and time constraints such as afterschool educators. This study reports on the design, implementation, and evaluation of an OPD on preparing 18 afterschool educators to teach a content-heavy, transmedia, STEM curriculum on cryptology…
Descriptors: Online Courses, Faculty Development, After School Programs, STEM Education
Peer reviewed Peer reviewed
Direct linkDirect link
Damjan Fujs; Simon Vrhovec; Tomaž Hovelja; Damjan Vavpotic – Education and Information Technologies, 2025
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the…
Descriptors: Foreign Countries, Older Adults, Digital Literacy, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Dhanya Pramod – Journal of Applied Research in Higher Education, 2025
Purpose: The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and…
Descriptors: Gamification, Computer Security, Information Security, Training
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ajibola Omoniyi Victor; Hamimah Ujir – Journal of Education and Learning (EduLearn), 2025
Information and communication technology (ICT) has become an essential part of the daily lives of tertiary students. However, research into assessing digital competency and its effects on academic performance is still limited. This paper explores students' needs for digital competence, the impact of digital access on academic performance, and the…
Descriptors: Foreign Countries, Undergraduate Students, Digital Literacy, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oralbek Yskak; Natalya Seitakhmetova; Sholpan Zhandossova; Marhabbat Nurov – Journal of Social Studies Education Research, 2025
Digital transformation is reshaping social and economic relations through the adoption of digital technologies, playing a crucial role in Kazakhstan's modernization and economic diversification. This study aims to comprehensively analyze the multifaceted process of digital transformation in Kazakhstan, with a particular emphasis on identifying…
Descriptors: Foreign Countries, Mathematical Models, Information Technology, Professional Personnel
Peer reviewed Peer reviewed
PDF on ERIC Download full text
R. Ravichandran; Sonam Singh; P. Sasikala – Journal of Cybersecurity Education, Research and Practice, 2025
This study investigates the awareness and practices of cyber security among school teachers, exploring their understanding of cyber threats, online behaviours, and response mechanisms to cyber incidents. A structured questionnaire was administered to gather data on demographic information, cyber security training, online practices, and experiences…
Descriptors: Computer Security, Information Security, Teacher Characteristics, Training
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4