Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Software | 3 |
| Deception | 3 |
| Decision Making | 3 |
| Correlation | 2 |
| Ethics | 2 |
| Information Security | 2 |
| Vignettes | 2 |
| Access to Education | 1 |
| Adolescents | 1 |
| Advisory Committees | 1 |
| Age Differences | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 1 |
| Guides - Non-Classroom | 1 |
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Audience
| Practitioners | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Office of Educational Technology, US Department of Education, 2024
The U.S. Department of Education is committed to supporting innovative advances in educational technology to improve teaching and learning across the nation's education systems and to support educators as they incorporate emerging technology into their learning communities. Artificial Intelligence (AI) in education is a complex and rapidly…
Descriptors: Equal Education, Artificial Intelligence, Computer Software, Technology Integration
Lo, Jesse Ho-Yin; Fu, Genyue; Lee, Kang; Cameron, Catherine Ann – Journal of Moral Education, 2020
This article examines relationships between children and youths' judgments and their justifications of truth telling and verbal deception, in situational and cultural contexts. Han Chinese, Euro-Canadians and Chinese-Canadians, seven- to 17-years of age were presented competitive scenarios in which protagonists told either lies to protect, or…
Descriptors: Moral Values, Cultural Context, Ethics, Sociocultural Patterns
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)

Peer reviewed
Direct link
