NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 481 to 495 of 1,624 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Black, Michael; Chapman, Debra; Clark, Angela – Information Systems Education Journal, 2018
The Enhanced Virtual Laboratory (EVL) is the product of a Department of Defense grant to enhance outreach, research, and education for cyber security. Through web-based laboratories, EVL allows users to remotely experience interactive content with virtual machines inside a modern web browser providing constructivism-based, student-centered,…
Descriptors: Computer Security, Computer Simulation, Laboratories, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Shuchang; Cai, Yan; Tu, Dongbo – Journal of Educational Measurement, 2018
This study applied the mode of on-the-fly assembled multistage adaptive testing to cognitive diagnosis (CD-OMST). Several and several module assembly methods for CD-OMST were proposed and compared in terms of measurement precision, test security, and constrain management. The module assembly methods in the study included the maximum priority index…
Descriptors: Adaptive Testing, Monte Carlo Methods, Computer Security, Clinical Diagnosis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Willy Ochaya – International Journal of Online Graduate Education, 2018
Cyberattacks have a similar global economic impact of a natural disaster such as Hurricane Katrina, according to Lloyds, the world's specialist insurance market of London report. According to Lloyd's of London, global cyberattacks pose a considerable risk to businesses, health service, and education, resulting in average economic losses of between…
Descriptors: Computer Security, Internet, Electronic Learning, Handheld Devices
Alexander, Rodney T. – ProQuest LLC, 2017
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…
Descriptors: Information Security, Statistical Analysis, Computers, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Payne, Bryson R. – Journal of Cybersecurity Education, Research and Practice, 2019
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semiautonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number…
Descriptors: Computer Security, Motor Vehicles, Information Security, Artificial Intelligence
Office of Educational Technology, US Department of Education, 2023
Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This "School Leader Digital Learning Guide" is a resource to help school leaders consider, plan, fund, implement, maintain, and adapt…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ivy, Jessica; Kelley, Robert; Cook, Kristin; Thomas, Kevin – International Journal of Computer Science Education in Schools, 2020
Although many practicing teachers have not experienced teacher preparation programs that teach cyber security (Pusely & Sadera, 2011) or are familiar with cyber principles (Authors), embedding these ideas into instruction in a variety of content areas is essential for promoting cyber literacy and citizenship. This study explores a professional…
Descriptors: Secondary School Curriculum, High School Teachers, Middle School Teachers, Faculty Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Scarabottolo, Nello – International Association for Development of the Information Society, 2018
This paper compares the students enrolled to a three-year undergraduate, bachelor degree on Security of Computer Systems and Networks -- offered in traditional, classroom fashion as well as online at the University of Milan (Italy) -- in terms of results in exams of the various courses as well as in the final dissertation for obtaining the degree.…
Descriptors: Online Courses, Educational Technology, Technology Uses in Education, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Olney, Andrew M.; Hosman, Eric; Graesser, Art; D'Mello, Sidney K. – Grantee Submission, 2017
We conducted a pilot study that used kernel-level packet capture to record the web pages visited by college students and the reading difficulty of those pages. Our results indicate that i) no students were fully compliant in their participation, ii) the number of texts encountered by participants was highly skewed, iii) the reading difficulty of…
Descriptors: College Students, Electronic Publishing, Web Sites, Difficulty Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lesko, Charles J., Jr. – Journal of Cybersecurity Education, Research and Practice, 2019
Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the…
Descriptors: Needs Assessment, Computer Security, Design, Computer Centers
Peer reviewed Peer reviewed
Direct linkDirect link
Zimmerle, Joanna C.; Wall, Anne S. – Computers in the Schools, 2019
Although the Children's Online Privacy Protection Act (COPPA) was enacted 20 years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children's personal data. Lengthy and oftentimes ambiguous policies…
Descriptors: Privacy, Computer Security, Computer Oriented Programs, Web Sites
Zahadat, Nima – ProQuest LLC, 2016
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…
Descriptors: Handheld Devices, Computer Security, Surveys, Policy
Pages: 1  |  ...  |  29  |  30  |  31  |  32  |  33  |  34  |  35  |  36  |  37  |  ...  |  109