Publication Date
| In 2026 | 0 |
| Since 2025 | 22 |
| Since 2022 (last 5 years) | 209 |
| Since 2017 (last 10 years) | 353 |
| Since 2007 (last 20 years) | 457 |
Descriptor
| Computer Security | 460 |
| Information Security | 460 |
| Information Technology | 109 |
| Foreign Countries | 99 |
| Privacy | 93 |
| Computer Science Education | 90 |
| Internet | 90 |
| Computer Software | 68 |
| Teaching Methods | 66 |
| Higher Education | 60 |
| Educational Technology | 51 |
| More ▼ | |
Source
Author
| Lawrence, Cameron | 4 |
| Marquardson, Jim | 4 |
| Payne, Brian K. | 3 |
| Anderson, Jimmeka | 2 |
| Antonenko, Pavlo | 2 |
| Belshaw, Scott H. | 2 |
| Brooks, D. Christopher | 2 |
| Celeda, Pavel | 2 |
| Cigularova, Daniela | 2 |
| Clouse, Shawn | 2 |
| Cummings, Jeff | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Texas | 12 |
| Turkey | 10 |
| India | 9 |
| United Kingdom | 9 |
| Canada | 7 |
| United States | 7 |
| China | 6 |
| Florida | 6 |
| Maryland | 6 |
| North Carolina | 6 |
| Australia | 5 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Tanja Samardzic; Christine Wildman; Paula C. Barata; Mavis Morton – International Journal of Social Research Methodology, 2024
In response to concerns about the use of online focus groups, particularly around sensitive topics research, we provide two case examples of sensitive topics research that pivoted to online focus groups amid university ethics restrictions due to COVID-19 concerns. We begin by contextualizing the studies, one of which used the more traditional…
Descriptors: Focus Groups, Videoconferencing, Young Adults, Foreign Countries
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Michael Klein; Zac Chase, Contributor – Office of Educational Technology, US Department of Education, 2023
This is the third in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Privacy
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Jaye-Jaye Johnson – ProQuest LLC, 2024
Educational technology (EdTech) interoperability throughout cyberspace provides the financial opportunity for collecting and selling of student privacy information. The research problem addressed throughout this study is the public school district leaders' (SDLs) understanding of EdTech cyber security practices and policies (EdTechCSPP). Little is…
Descriptors: Public Schools, School Districts, Computer Security, Information Security
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Georgia Zempila; Stelios Xinogalos – Discover Education, 2025
The Internet is nowadays an integral part of adolescents' everyday life, bringing several benefits but risks as well. Although adolescents are familiar with technology, there seems to be a gap in their knowledge in safety and data protection on the Internet. So it is clear that adolescents have to be educated on relevant issues and serious games…
Descriptors: Educational Games, Teaching Methods, Internet, Information Security
Alison Lui; Catharina Womack; Penny Orton – Education and Information Technologies, 2025
This article critically evaluates the effects of the ACU Virtual Mobility (VM) Project Digital Information Security Course (DISC) programme on improving students' awareness of cyber security skills, pre and post the educational intervention. Our selected VM tool is Collaborative Online International Learning (COIL). Building on a conceptual…
Descriptors: Cooperative Learning, Electronic Learning, Foreign Countries, Information Security
Esra Betül Kölemen; Bekir Yildirim – Education and Information Technologies, 2025
This study aimed to evaluate the role of AI in preschool from the perspective of preschool teachers. The research group consisted of 101 preschool teachers. The study group was selected according to the easily accessible case sampling method, one of the purposeful sampling methods. The study was a phenomenology, which is a qualitative research…
Descriptors: Early Childhood Education, Teacher Attitudes, Opinions, Technology Uses in Education
Tereza Hannemann; Nikol Kopánková; Petra Surynková – Journal of Adult and Continuing Education, 2025
In today's world, having at least basic digital skills is essential in working, social, and family life. The present study uses grounded theory to explore ways in which people with little formal schooling engage with the digital world. Drawing on 54 semi-structured interviews, it describes how people with little IT experience from formal education…
Descriptors: Adult Students, Technological Literacy, Computer Security, Information Security
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices

Peer reviewed
Direct link
