Publication Date
| In 2026 | 0 |
| Since 2025 | 56 |
| Since 2022 (last 5 years) | 373 |
| Since 2017 (last 10 years) | 645 |
| Since 2007 (last 20 years) | 1197 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Desmond Rudd; Zac Chase, Contributor; Michael Klein, Contributor – Office of Educational Technology, US Department of Education, 2025
This is the fourth in a series of five briefs published by Office of Education Technology (OET) on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations outlined in the 2017 OET…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Rural Areas
Noah Glaser; Zeinab Parishani; Amogh Chetankumar Joshi; Prasad Calyam – Technology, Knowledge and Learning, 2025
As Virtual Reality (VR) gains traction in education, its potential to support neurodivergent learners in cybersecurity training remains underexplored. This emerging technology report examines how VR can bridge the gap between STEM education and cybersecurity training for neurodivergent individuals, highlighting both its promise and the challenges…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Science Education, Computer Security
Topuz, Arif Cem; Saka, Eda; Fatsa, Ömer Faruk; Kursun, Engin – Smart Learning Environments, 2022
The COVID-19 pandemic caused many educational institutions in the world to switch to the distance education process, and this process was called "Emergency Remote Teaching". This urgent transition process has caused many problems in educational environments. One of the problems is the subject of measurement and evaluation. Along with the…
Descriptors: COVID-19, Pandemics, Distance Education, Student Evaluation
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security
Gilmore, Derrick C. – ProQuest LLC, 2022
Research administration is a matter of concern for institutions of higher education. While national trends reveal a lack of interest in investing in higher education institutions through federal and state allocations, such institutions have turned to sponsored research as a means of addressing critical issues of instruction, research, and public…
Descriptors: Research Administration, Small Colleges, Financial Support, Technology Integration
Ricci, Joseph; Breitinger, Frank; Baggili, Ibrahim – Education and Information Technologies, 2019
Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link the security chain. Therefore, this survey focused on analyzing the interest for adults for 'cyber threat eduction seminars', e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand…
Descriptors: Computer Security, Crime, Adults, Seminars
Emeka Ejikeme – ProQuest LLC, 2023
The U.S. National Institute of Standards and Technology (NIST) identified that approximately 1.8 million cybersecurity positions were vacant in 2021 because of a lack of professionals with the required skill sets and who remained in their jobs long enough to contribute to their organizations' cybersecurity needs. Also shown was the rising global…
Descriptors: Best Practices, Computer Security, College Graduates, Computer Literacy
Garrett J. Stevens – ProQuest LLC, 2023
Faculty and staff working from home during the COVID pandemic were presented with new challenges in adapting to emergency remote teaching, as well as new and expanded cyber security threats. Changes to course delivery, remote access from public locations, and the potential of faculty and staff storing confidential educational records on…
Descriptors: COVID-19, Pandemics, College Faculty, School Personnel
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Jonathan Hobbs – ProQuest LLC, 2023
Cybersecurity protection remains at the forefront of many organizations' information and communication technology strategies and investments. Higher education has become a profitable target for cyber-attacks which has many institutions reevaluating their cybersecurity awareness programs. The purpose of this research was to determine the…
Descriptors: Computer Security, Information Security, Higher Education, College Faculty
David Javier-Aliaga; Oscar Rubén Silva Neyra; Yaquelin E. Calizaya-Milla; Jacksaint Saintila – Contemporary Educational Technology, 2024
The objective of this study is to determine the relationship between academic self-efficacy and digital competence in a sample of undergraduate university students in Peru. The design was nonexperimental, cross-sectional, and correlational. The non-probabilistic sample consisted of 98 students from a private university in Peru. Academic…
Descriptors: Self Efficacy, Competence, Digital Literacy, Undergraduate Students
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Office of Educational Technology, US Department of Education, 2024
Today and in the future, a growing array of Artificial Intelligence (AI) models and capabilities will be incorporated into the products that specifically serve educational settings. The U.S. Department of Education (Department) is committed to encouraging innovative advances in educational technology (edtech) to improve teaching and learning…
Descriptors: Artificial Intelligence, Computer Uses in Education, Educational Technology, Ethics
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Saah Agyemang-Badu; Felisa Tibbitts; Sage Phillips – Current Issues in Comparative Education, 2024
The treatment of artificial intelligence (AI) in the field of education has so far been typically characterized by (a) information about how AI can assist educators in carrying out their work, and (b) concerns about the misuse of AI by learners, for example, concerning plagiarism. The links between AI and ethics within the field of education are…
Descriptors: Artificial Intelligence, Elementary Secondary Education, Higher Education, Ethics

Peer reviewed
Direct link
