NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 541 to 555 of 1,624 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Mark; Baskett, Mike; Allen, Mark; Francis, Hulya; Kifayat, Kashif – Innovations in Education and Teaching International, 2018
Animated learning materials have the potential to support the teaching and learning process. In this paper, we examine the comparative usefulness of animated and static learning materials for teaching cyber security concepts to a group of UK undergraduate computer science students. The animated cyber security learning materials appeared to be…
Descriptors: Foreign Countries, Information Security, Teaching Methods, Animation
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – Online Submission, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Enfinger, Kerry Wayne – ProQuest LLC, 2016
The number of malicious files present in the public domain continues to rise at a substantial rate. Current anti-malware software utilizes a signature-based method to detect the presence of malicious software. Generating these pattern signatures is time consuming due to malicious code complexity and the need for expert analysis, however, by making…
Descriptors: Artificial Intelligence, Computer Software, Identification, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Singletary, Tod J. – ProQuest LLC, 2017
The United States Military has become increasingly dependent upon technology to meet its mission objectives with a consequence being greater dependence on civilian defense contractors to provide specialized services in support of high-tech mission requirements. Modern military defense contractors have also become dependent upon reliable and secure…
Descriptors: Armed Forces, Information Security, Risk, Outsourcing
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
National Forum on Education Statistics, 2022
Digital inequity has been a long-standing issue in the education community. A lack of home internet and technology devices can not only hinder students' ability to access educational resources at home, but can also have a detrimental effect on student achievement. Education agencies have taken steps over the past decades to address digital…
Descriptors: Access to Computers, Technology Uses in Education, Educational Technology, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Essig, Rebecca R.; Elahi, Behim; Hunter, Jennifer L.; Mohammadpour, Atefeh; O'Connor, Kimberly W. – Journal of STEM Outreach, 2020
"Future Girls of STEM" is a university-sponsored, summer camp outreach program that was designed and implemented by an all-female faculty group to increase young girls' interest in pursuing future careers in science, technology, engineering, and mathematics (STEM). This paper discusses the logistics and results of the pilot Future Girls…
Descriptors: Females, Camps, STEM Education, Engineering
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Lingelbach, Kembley K. – ProQuest LLC, 2018
Despite multiple national, educational, and industry initiatives, women continue to be underrepresented in the cybersecurity field. Only 11% of cybersecurity professionals, globally, are female. This contributes to the growing overall shortage of workers in the field. This research addressed the significant underrepresentation of females in the…
Descriptors: Females, Computer Security, Information Security, Self Efficacy
Lester, Teresa M. – ProQuest LLC, 2018
The purpose of this mixed-methods investigation was to determine how teachers and parents understood and educated themselves on cyber safety. This research explored how teachers and parents found and used resources available to stay informed of the constant threats and changes for students while online. The amount of time young people spend with…
Descriptors: Computer Security, Information Security, Teacher Attitudes, Parent Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Wheeler, Anne Marie; Bertram, Burt – American Counseling Association, 2019
This eighth edition provides a current and comprehensive discussion of counselors' legal and ethical responsibilities, an examination of state and federal laws as they relate to practice, and helpful risk management strategies. Attorney Nancy Wheeler and Burt Bertram, a private practitioner and counselor educator, offer real-world practical tips…
Descriptors: School Counselors, School Counseling, Legal Responsibility, Ethics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Pages: 1  |  ...  |  33  |  34  |  35  |  36  |  37  |  38  |  39  |  40  |  41  |  ...  |  109