NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 337 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Murat Canpolat; Cemal Karadas – Education and Information Technologies, 2024
As children spend more time in the digital world, numerous researchers have studied access to and use of the internet. They pointed out the positive and negative consequences of that. However, despite the importance of children's conscious use of the internet and parental guidance, the awareness and needs of parents in this area have not been…
Descriptors: Internet, Needs, Parent Attitudes, Parent Child Relationship
Patrick Ward – ProQuest LLC, 2024
This proposal is to develop a framework for designing a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges such as program accreditation, workforce development, and Department of Homeland Security/National Security Agency…
Descriptors: Community Colleges, College Programs, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Filipe T. Moreira; Mário Vairinhos; Fernando Ramos – Educational Media International, 2024
The Internet of Things is shifting the way people interact with each other, the way people interact with objects, and the way objects interact with each other. This reality is creating a new paradigm, where the world becomes more interconnected. In the field of Education, we are at the beginning of understanding the profound transformation that…
Descriptors: Educational Technology, Technology Uses in Education, Interaction, Internet
Connie D. Howard – ProQuest LLC, 2021
This qualitative study contributes to the limited body of knowledge on cybersecurity in middle schools beyond awareness programs. The purpose was to develop a pilot training module for middle school students comprising an analysis of public documents to examine what topics should be included in a pilot training program to reduce problematic cyber…
Descriptors: Program Development, Pilot Projects, Middle School Students, Computer Security
MENTOR: National Mentoring Partnership, 2022
E-mentoring has, until recently, constituted a fairly small niche of the programmatic mentoring landscape. But nothing has spurred the adoption of virtual mentoring services more than the onset of the COVID-19 pandemic in the spring of 2020. Almost overnight, the nation's mentoring programs faced an uncertain future in which their main objective…
Descriptors: Mentors, Delivery Systems, Internet, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Alemdag, Ecenaz; Yildirim, Zahide – Educational Technology Research and Development, 2022
Although formative peer assessment (FPA) has become a prevailing learning activity in different educational settings, there are not enough suggestions on how to structure it with instructional supports in online environments to optimize its benefits. Therefore, this study aims to propose design guidelines for the development of an effective online…
Descriptors: Formative Evaluation, Peer Evaluation, Computer Assisted Testing, High Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Calaguas, Noriel P.; Consunji, Paolo Maria P. – Education and Information Technologies, 2022
We aimed to model the direct effects of the theorized relationships of academic self-efficacy, computer use self-efficacy, learning management system self-efficacy, internet and information-seeking self-efficacy, and online learning self-efficacy using structural equation modeling. The study proves that academic self-efficacy has positive…
Descriptors: Structural Equation Models, Self Efficacy, Computer Use, Academic Ability
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Baran, Bahar; Yaci, Sirin Nur; Ocal, Murat; Siyez, Digdem Muge – Journal of Education in Science, Environment and Health, 2022
Health-related internet sources should contain accurate, reliable and updated information, and their usability should be high to enable people to navigate successfully. This study aimed to develop interactive Online Infertility Prevention Training (OIPT) and to reveal design principles by evaluating the online training. The development, design,…
Descriptors: Prevention, Pregnancy, Online Courses, Internet
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2023
Ensuring that students come to school prepared to learn involves comprehensive emergency management planning that supports students in all settings and at all times. This includes protecting students as they participate in online spaces. As Internet communication technology continues to advance, so do opportunities for criminals to entice,…
Descriptors: Emergency Programs, Online Courses, Internet, Electronic Learning
Burns, Monica – ASCD, 2021
In a world awash in technology, what EdTech skills and strategies should educators focus on to ensure they are making the best use of online spaces for classroom learning? How can they navigate through the overwhelming number of options in digital tools and spaces? How can they guide students in learning best practices? EdTech consultant Monica…
Descriptors: Educational Technology, Technology Uses in Education, Teaching Methods, Teacher Competencies
Peer reviewed Peer reviewed
Direct linkDirect link
Farrer, Louise M.; Gulliver, Amelia; Katruss, Natasha; Bennett, Kylie; Bennett, Anthony; Ali, Kathina; Griffiths, Kathleen M. – British Journal of Guidance & Counselling, 2020
There is growing recognition of the importance of addressing the mental health needs of young people attending university. Anonymous, scalable, and evidence-based online interventions can help to reduce burden on university services and increase access to care for marginalised or disconnected students. This paper reports the participatory design…
Descriptors: Program Development, Health Services, Mental Health, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Aneta Kwak – College & Research Libraries, 2025
Introducing accessibility initiatives is increasing across academic libraries and effective library staff training is one of the factors for the successful implementation and continuity of any accessibility endeavours. This case study outlines the development of a training program to teach student library assistances to format scanned PDFs to be…
Descriptors: Academic Libraries, Library Personnel, Training Methods, Program Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Said-Hung, Elias; Gonzalez-Prieto, Evaristo; Pallarès-Piquer, Marc – Technology, Pedagogy and Education, 2021
Numerous studies have examined the phenomenon of bullying. The development of information and communications technology (ICT) has enabled an emerging form of bullying known as cyberbullying. This article presents a case study of an Internet-focused bullying prevention programme in a Spanish secondary school with 627 students, from a…
Descriptors: Prevention, Bullying, Computer Mediated Communication, Information Technology
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  23