NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 286 to 300 of 1,629 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Debnath, Diptasree; Ghosh, Emlon; Banik, Barnali Gupta – International Journal of Web-Based Learning and Teaching Technologies, 2020
Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation…
Descriptors: Computer Security, Information Security, Privacy, Color
Peer reviewed Peer reviewed
Direct linkDirect link
Shaobin Chen; Qingrong Li; Tao Wang – International Journal of Information and Communication Technology Education, 2024
This study aims to assess the implementation of smart campus and the students' learning engagement at Zhongshan College, China. A well-structured questionnaire was developed, and information was collected from 277 students and 377 teachers. The results indicate that both groups of respondents highly agree on the construction levels of the smart…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Learner Engagement
Peer reviewed Peer reviewed
Direct linkDirect link
Huiling Ma; Lilliati Ismail; Weijing Han – Education and Information Technologies, 2024
The advancement and application of Artificial Intelligence (AI) has introduced innovative changes in language learning and teaching. In particular, the widespread utilization of various chatbots as foreign language learning partners showcases their remarkable potential contribution to the field. Nevertheless, there are currently few studies that…
Descriptors: Bibliometrics, Artificial Intelligence, Computer Software, Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Florence Martin; Doreen Mushi; Siyu Long; Julie Bacak; Drew Polly; Weichao Wang; Lynn Ahlgrim-Delzell – Journal of Technology and Teacher Education, 2024
Digital safety involves protecting oneself, and one's personal information to mitigate the risks that are inherently associated with using digital technologies. This study employed a multi-method design to explore 26 inservice and preservice elementary teacher experiences from attending a professional development on digital safety and facilitating…
Descriptors: Safety, Preservice Teachers, Elementary School Teachers, Summer Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Borka Jerman Blažic; Andrej Jerman Blažic – International Society for Technology, Education, and Science, 2024
Based on an exhaustive study from 2001-2003 involving 14 high schools in the EU, a definition of the educational content and the aligned methodology for high school levels was developed for two areas--cyber safety and cybersecurity--with the aim of improving the knowledge and skills of students and their teachers. Available sources, including…
Descriptors: Teaching Methods, Computer Science Education, Information Security, Computer Security
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Payne, Brian K.; Cross, Bria; Vandecar-Burdin, Tancy – Journal of Cybersecurity Education, Research and Practice, 2022
The value of academic advising has been increasingly emphasized in higher education. In this study, attention is given to the most significant types of advice that a sample of cybersecurity faculty and advisors from the Commonwealth of Virginia recommend giving to cybersecurity students. The results show that faculty and advisors recommended that…
Descriptors: Faculty Advisers, Academic Advising, Computer Security, Experience
Peer reviewed Peer reviewed
Direct linkDirect link
Paiva, José Carlos; Leal, José Paulo; Figueira, Álvaro – ACM Transactions on Computing Education, 2022
Practical programming competencies are critical to the success in computer science (CS) education and go-to-market of fresh graduates. Acquiring the required level of skills is a long journey of discovery, trial and error, and optimization seeking through a broad range of programming activities that learners must perform themselves. It is not…
Descriptors: Automation, Computer Assisted Testing, Student Evaluation, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Hinchman, David B. – US Government Accountability Office, 2022
The COVID-19 pandemic forced schools across the nation to increase their reliance on IT to deliver educational instruction to students. This amplified the vulnerability of K-12 schools to potentially serious cyberattacks. The US Government Accountability Office (GAO) was asked to review cybersecurity in K-12 schools. The objectives of this report…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Government Role
Jakob E. Barnard – ProQuest LLC, 2022
This project examined the adoption of cybersecurity into computing programs within liberal arts programs and whether the rate constitutes an innovative program. The research questions focused on the lived experience existing faculty members have had with the cybersecurity curriculum within liberal arts computing programs. Liberal arts general…
Descriptors: Hermeneutics, Phenomenology, Computer Security, Computer Science Education
Chapman, John – Higher Education Policy Institute, 2019
Higher education regularly experiences cyber attacks. Organisations that do not adequately protect themselves risk the loss or exposure of personal student and staff data and also commercial, institutional and research data that are valuable to cyber criminals operating domestically and internationally. This paper discusses: (1) the current…
Descriptors: Higher Education, Internet, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Pages: 1  |  ...  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  ...  |  109