NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 421 to 435 of 1,624 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Peer reviewed Peer reviewed
Direct linkDirect link
Kong, Siu-Cheung; Ma, Yunsi Tina – International Journal of Distance Education Technologies, 2022
The current study aims to analyse school leaders' understanding and expectation of, and support for, online teaching and learning during and after the outbreak of the COVID-19 pandemic. Based on the theory of reasoned action (TRA) framework, the authors designed a questionnaire and collected 319 responses from school principals about their views…
Descriptors: Administrator Attitudes, Principals, Online Courses, COVID-19
Peer reviewed Peer reviewed
Direct linkDirect link
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Valcourt, Scott A. – ProQuest LLC, 2017
The Science DMZ is a network research tool offering superior large science data transmission between two locations. Through a network design that places the Science DMZ at the edge of the campus network, the Science DMZ defines a network path that avoids packet inspecting devices (firewalls, packet shapers) and produces near line-rate transmission…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data Processing
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Dana Kube; Sebastian Gombert; Brigitte Suter; Joshua Weidlich; Karel Kreijns; Hendrik Drachsler – Journal of Computer Assisted Learning, 2024
Background: Gender stereotypes about women and men are prevalent in computer science (CS). The study's goal was to investigate the role of gender bias in computer-supported collaborative learning (CSCL) in a CS context by elaborating on gendered experiences in the perception of individual and team performance in mixed-gender teams in a hackathon.…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Gender Issues, Learning Activities
Keith Lee; Evo Popof; Chris Reykdal, Contributor – State Educational Technology Directors Association, 2024
The 2023-24 school year was a big year for educational technology. As the world of educational technology has evolved, so has SETDA's State EdTech Trends Survey. This year's survey and report feature new questions (which will likely become recurring questions) and some changes to old questions to reflect the mainstreaming of AI in K-12 education.…
Descriptors: Educational Technology, Educational Trends, Technology Uses in Education, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Liew, Tze Wei; Pang, Wei Ming; Leow, Meng Chew; Tan, Su-Mae – Smart Learning Environments, 2022
Emotional design refers to imbuing a multimedia learning environment with design attributes that promote learners' positive affect and motivation to enhance learning. One such feature is anthropomorphism, in which human-like attributes are infused into learning elements in a multimedia learning environment. This study examines the affective,…
Descriptors: Multimedia Instruction, Instructional Design, Multimedia Materials, Human Body
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thomas, Kevin M.; Ivy, Jessica; Cook, Kristin; Kelley, Robert R. – Journal of Cybersecurity Education, Research and Practice, 2022
The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers' technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Joshi, Omkar; Chapagain, Binod; Kharel, Gehendra; Poudyal, Neelam C.; Murray, Bryan D.; Mehmood, Sayeed R. – Interactive Learning Environments, 2022
Many land-grant institutions with agriculture and natural resource programs in the United States offer online courses to meet student demand. The goal of this study was to understand how major educational stakeholders, including instructors and students, perceive the benefits and limitations of online teaching and learning in agriculture and…
Descriptors: Online Courses, Distance Education, Electronic Learning, Web Based Instruction
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Office of Inspector General, US Department of Education, 2022
The U.S. Department of Education (Department) Office of Inspector General (OIG) Strategic Plan for Fiscal Years (FY) 2023 through 2028 represents the planned direction of the organization for FYs 2023-2028. It continues the 40-plus year commitment to the mission to promote the efficiency, effectiveness, and integrity of the Department's programs…
Descriptors: Strategic Planning, Educational Planning, Federal Government, Public Agencies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Pages: 1  |  ...  |  25  |  26  |  27  |  28  |  29  |  30  |  31  |  32  |  33  |  ...  |  109