Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Brooks, Tyson T. – ProQuest LLC, 2013
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
Descriptors: Risk Management, Computer Security, Computer Software, Computer Networks
Houghton, Robert F. – ProQuest LLC, 2013
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
Descriptors: Information Technology, Computer Security, Models, Interviews
Kansu, Ceren Çevik; Öksüz, Yücel – Journal of Education and Training Studies, 2019
This study was aimed to determine of their perceptions and levels of digital citizenship for pre-service classroom teachers. The study was conducted with 76 senior pre-service classroom teachers at Education Faculty of B. U. The study is survey research. In this research, "The Digital Citizenship Scale" developed by Kocadag (2012) was…
Descriptors: Preservice Teachers, Student Attitudes, Technological Literacy, Information Technology
Dittrich, David – Research Ethics, 2015
This paper considers some of the ethical issues surrounding the study of malicious activity in social networks, specifically using a technique known as "social honeypots" combined with the use of deception. This is a potentially touchy area of study that is common to social and behavioral research that is well understood to fall within…
Descriptors: Social Networks, Social Media, Ethics, Deception
Michelle Tolbert; Jordan Hudson; Heather Claussen Erwin – Office of Career, Technical, and Adult Education, US Department of Education, 2015
This report is designed to inform federal, state, and local corrections and correctional education administrators as they explore ways to securely and cost-effectively provide advanced technologies in corrections facilities to help strengthen and expand educational and reentry services. It describes the current status of these technologies in…
Descriptors: Correctional Education, Technology Integration, Educational Technology, Administrators
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence
Murphy, Colleen F. – ProQuest LLC, 2018
By 2020, the global need for information security professionals is expected to reach six million and the shortfall in meeting that need is expected to be over one and a half million. Not only is there a shortage of cybersecurity professionals but those who are graduates of a cybersecurity program are not adequately skilled to assume significant…
Descriptors: Instructional Design, Computer Security, Information Security, Labor Force Development
Mahalingam, Sheila; Abdollah, Mohd Faizal; bin Sahibuddin, Shahrin – International Journal of Distance Education Technologies, 2014
Mobile Learning has a potential to improve efficiency in the education sector and expand educational opportunities to underserved remote area in higher learning institutions. However there are multi challenges in different altitude faced when introducing and implementing m-learning. Despite the evolution of technology changes in education,…
Descriptors: Electronic Learning, Computer Security, Reliability, Computer System Design
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Computer Security
Croft, Michelle – ACT, Inc., 2014
Given the transition from paper-and-pencil to computer administration, policymakers must update test security laws and policies to reflect the new threats to administration. There will likely always be a need for paper-and-pencil test administration security laws and policies, given that paper test copies may be needed as an accommodation or may…
Descriptors: Computer Assisted Testing, Computer Security, Information Security, Laws
Abilock, Rigele; Abilock, Debbie – Knowledge Quest, 2016
In April 2015, U.S. House Representatives Luke Messer and Jared Polis introduced the bipartisan Student Digital Privacy and Parental Rights Act of 2015, designed to significantly restrict how online education vendors can exploit the personal data of students who use their products. For some, the bill does not go far enough. It is evident that…
Descriptors: Privacy, Parent Rights, Federal Legislation, Safety
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
Seng Thah, Soon – International Journal of Computer-Assisted Language Learning and Teaching, 2022
This study was conducted to determine the level of ICT competencies among Malaysian language teachers at both primary and secondary schools. The focus of this study was on four specific domains: 1) technological concepts and operational skills; 2) pedagogical skills; 3) professional skills; and 4) social, ethics, and security skills. These skills…
Descriptors: Language Teachers, Pedagogical Content Knowledge, Second Language Learning, Second Language Instruction

Direct link
Peer reviewed
