Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 4 |
Descriptor
Source
| Association for Educational… | 1 |
| International Association for… | 1 |
| International Educational… | 1 |
| Journal of Information… | 1 |
| ProQuest LLC | 1 |
Author
| Crawford, Margaret, Ed. | 1 |
| Hwang, Jae-Won | 1 |
| Kim, Rosemary | 1 |
| Laurel Lynn Schneider | 1 |
| Mavrikis, Manolis, Ed. | 1 |
| McLaren, Bruce M., Ed. | 1 |
| Pardos, Zachary, Ed. | 1 |
| Simonson, Michael, Ed. | 1 |
| Stamper, John, Ed. | 1 |
| Yoon, Cheolho | 1 |
Publication Type
| Collected Works - Proceedings | 3 |
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 3 |
| Elementary Secondary Education | 2 |
| Elementary Education | 1 |
| Grade 6 | 1 |
| Intermediate Grades | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Secondary Education | 1 |
Audience
Location
| Asia | 2 |
| South Korea | 2 |
| United States | 2 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Finland | 1 |
| Florida | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers
Simonson, Michael, Ed.; Crawford, Margaret, Ed. – Association for Educational Communications and Technology, 2004
For the twenty-seventh year, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the National AECT Convention in Chicago, Illinois. The Proceedings of AECT's Convention are published in two…
Descriptors: Research and Development, Communications, Educational Technology, Mathematics Instruction

Direct link
Peer reviewed
