Publication Date
| In 2026 | 0 |
| Since 2025 | 9 |
| Since 2022 (last 5 years) | 24 |
| Since 2017 (last 10 years) | 41 |
| Since 2007 (last 20 years) | 46 |
Descriptor
| Computer Security | 47 |
| Technology Uses in Education | 47 |
| Information Security | 25 |
| Foreign Countries | 19 |
| Educational Technology | 15 |
| Privacy | 14 |
| Artificial Intelligence | 9 |
| Student Attitudes | 9 |
| Electronic Learning | 8 |
| Technological Literacy | 8 |
| Barriers | 7 |
| More ▼ | |
Source
Author
| Jenay Robert | 3 |
| Martin, Florence | 3 |
| Gezer, Tuba | 2 |
| Jamie Reeves | 2 |
| Kathe Pelletier | 2 |
| Mark McCormack | 2 |
| Nichole Arbino | 2 |
| Nicole Muscanell | 2 |
| Adil Jeghal | 1 |
| Ahlgrim-Delzell, Lynn | 1 |
| Ahmed Eddaoui | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 47 |
| Journal Articles | 40 |
| Tests/Questionnaires | 4 |
| Information Analyses | 2 |
| Dissertations/Theses -… | 1 |
Education Level
Audience
| Teachers | 2 |
| Administrators | 1 |
| Students | 1 |
Location
| India | 4 |
| United Arab Emirates | 2 |
| Australia | 1 |
| Botswana | 1 |
| California | 1 |
| Cambodia | 1 |
| Canada | 1 |
| China | 1 |
| Colombia | 1 |
| Czech Republic | 1 |
| Georgia | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Oumaima Ouadoud; Tarik Chafiq; Ahmed Eddaoui – Educational Process: International Journal, 2025
Background/purpose. This research was conducted to address the growing need for more secure, transparent, and efficient solutions for the issuance and management of university degrees. The main purpose of the study is to evaluate which Blockchains are best suited for this application, aiming to enhance the reliability and speed of degree-related…
Descriptors: Academic Degrees, Technology Uses in Education, Computer Security, Academic Records
R. Ravichandran; Sonam Singh; P. Sasikala – Journal of Cybersecurity Education, Research and Practice, 2025
This study investigates the awareness and practices of cyber security among school teachers, exploring their understanding of cyber threats, online behaviours, and response mechanisms to cyber incidents. A structured questionnaire was administered to gather data on demographic information, cyber security training, online practices, and experiences…
Descriptors: Computer Security, Information Security, Teacher Characteristics, Training
Mohamed Al Hemairy; Manar Abu Talib; Ather Khalil; Ahsan Zulfiqar; Takua Mohamed – Education and Information Technologies, 2024
Academic credentials play an immensely significant role in the career of a person and in the progress of society. The system in place currently used for the issuance, storage & sharing of academic credentials is quite inefficient in its operations, due to being paper based in large. There is also widespread fraud committed every year in terms…
Descriptors: Foreign Countries, Computer Security, Information Security, Credentials
Jenay Robert – EDUCAUSE, 2025
In the "2024 EDUCAUSE Horizon Report: Cybersecurity and Privacy Edition," a panel of experts agreed that a key practice for advancing the future of higher education cybersecurity and privacy is supporting agency, trust, transparency, and involvement among stakeholders. In fact, these are such important topics for the higher education…
Descriptors: Higher Education, Futures (of Society), Educational Trends, Trust (Psychology)
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Esra Betül Kölemen; Bekir Yildirim – Education and Information Technologies, 2025
This study aimed to evaluate the role of AI in preschool from the perspective of preschool teachers. The research group consisted of 101 preschool teachers. The study group was selected according to the easily accessible case sampling method, one of the purposeful sampling methods. The study was a phenomenology, which is a qualitative research…
Descriptors: Early Childhood Education, Teacher Attitudes, Opinions, Technology Uses in Education
Tereza Hannemann; Nikol Kopánková; Petra Surynková – Journal of Adult and Continuing Education, 2025
In today's world, having at least basic digital skills is essential in working, social, and family life. The present study uses grounded theory to explore ways in which people with little formal schooling engage with the digital world. Drawing on 54 semi-structured interviews, it describes how people with little IT experience from formal education…
Descriptors: Adult Students, Technological Literacy, Computer Security, Information Security
Philip Newton; Maira Xiromeriti – Assessment & Evaluation in Higher Education, 2024
Media coverage suggests that ChatGPT can pass examinations based on multiple choice questions (MCQs), including those used to qualify doctors, lawyers, scientists etc. This poses a potential risk to the integrity of those examinations. We reviewed current research evidence regarding the performance of ChatGPT on MCQ-based examinations in higher…
Descriptors: Multiple Choice Tests, Artificial Intelligence, Integrity, Computer Software
Leonardo Gallego Joya; Martha Andrea Merchán Merchán; Ellie Anne López Barrera – Contemporary Educational Technology, 2025
The systematic review permitted the characterization of training programs in digital teaching competence using an analysis of their structure, implementation, and results. A comprehensive search was conducted across five databases, namely Scopus, Web of Science, Redalyc, Science Direct, and LENS, to retrieve scientific articles published between…
Descriptors: Teacher Competencies, Technological Literacy, Teacher Motivation, Teacher Education Programs
Project Tomorrow, 2021
Project Tomorrow's® annual Speak Up Research Project has documented the evolution of technology use, both from an instructional and operational perspective, within K-12 education since 2003. Since 2017, the Speak Up results have also included a focus on K-12 districts' cybersecurity preparations. However, today, the combination of the expansion of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Jenay Robert; Nicole Muscanell; Mark McCormack; Kathe Pelletier; Kim Arnold; Nichole Arbino; Keturah Young; Jamie Reeves – EDUCAUSE, 2025
Higher education is in a period of massive transformation and uncertainty. Not only are current events impacting how institutions operate, but technological advancement--particularly in AI and virtual reality--are reshaping how students engage with content, how cognition is understood, and how learning itself is documented and valued. Our newly…
Descriptors: Higher Education, Educational Trends, Educational Technology, Artificial Intelligence
Embracing Artificial Intelligence to Improve Self-Directed Learning: A Cybersecurity Classroom Study
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
G. S. Prakasha; Juan José Leiva-Olivencia; Amber Simpson; Trent Grundmeyer; Anthony Kenneth – Computers in the Schools, 2024
Higher education students use digital devices for learning, entertainment, and financial transactions. The present study examines undergraduate (UG) students' challenges faced in cyber security space amid digital environments. The study employed a qualitative research design with a narrative inquiry method to capture the lived experiences,…
Descriptors: Student Experience, Barriers, Coping, Undergraduate Students

Peer reviewed
Direct link
