NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 691 to 705 of 1,624 results Save | Export
Kool, Wouter; van der Werf, Titia; Lavoie, Brian – OCLC Online Computer Library Center, Inc., 2014
The Preservation Health Check (PHC) project, undertaken as a joint effort by Open Planets Foundation (OPF) and OCLC Research, aims to evaluate the usefulness of the preservation metadata created and maintained by operational repositories for assessing basic preservation properties. The PHC project seeks to develop an implementable logic to support…
Descriptors: Information Storage, Metadata, Information Management, Computer Security
Birge, Colin – ProQuest LLC, 2013
Designers who create user interfaces are frequently required to ask users for personal information. For the user, this is a "trust question": Do I, the user, trust the system or entity that is asking me for this information? The creation and management of these trust questions is an important aspect of the research field called usable…
Descriptors: Design, Trust (Psychology), Surveys, Mixed Methods Research
Peer reviewed Peer reviewed
Direct linkDirect link
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities
Lawrence, A. S. Arul, Ed.; Thiyagarajan, P., Ed. – Online Submission, 2021
"Skill is laying the foundation for a brighter India. As John Ruskin puts it, "Skill is the unified force of experience, intellect, and passion in their operation." "Nation Building" is a herculean task that involves the government of the land, private and public institutions, industries, organisations, and every citizen…
Descriptors: Foreign Countries, Nationalism, Economic Development, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Smith, Catherine L. – Information Research: An International Electronic Journal, 2016
Introduction: The analysis of detailed interaction records is fundamental to development of user-centred systems. Researchers seeking such data must recruit volunteers willing to allow tracking of their interactions. This study examines privacy and trust attitudes in the intent to volunteer for research requiring installation of tracking software.…
Descriptors: Privacy, Trust (Psychology), Data Analysis, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Roberta – Australian Educational Computing, 2016
Young people's online safety continues to be a high priority for educators and parents. Cybersafety policies and educational programs are continually updated and revised to accommodate for the innovative ways they engage with digital culture. However, empirical research has shown that despite these efforts young people, especially teen girls,…
Descriptors: Adolescents, Females, Computer Security, Safety
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Waguespack, Leslie J. – Information Systems Education Journal, 2014
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
Descriptors: Computer Security, Internet, Information Systems, Computer Software
Daniels, Daniel B., III – ProQuest LLC, 2014
There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…
Descriptors: Information Security, Open Source Technology, Information Management, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Sun, Jerry Chih-Yuan; Kuo, Cian-Yu; Hou, Huei-Tse; Lin, Yu-Yan – Educational Technology & Society, 2017
The purposes of this study were to provide a game-based anti-phishing lesson to 110 elementary school students in Taiwan, explore their learning behavioral patterns, and investigate the effects of the flow states on their learning behavioral patterns and learning achievement. The study recorded behaviour logs, and applied a pre- and post-test on…
Descriptors: Educational Games, Electronic Learning, Educational Technology, Elementary School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Peer reviewed Peer reviewed
Direct linkDirect link
Morgan, Hani – Reading Improvement, 2015
Today an increasing number of teachers have successfully implemented blogging with students ranging from kindergarten through high school (Hungerford-Kresser, Wiggins, & Amaro-Jimenez, 2012). Although research on blogging is scant, existing studies suggest it can benefit students in various ways (Meinecke, Smith, & Lehmann-Willenbrock,…
Descriptors: Web 2.0 Technologies, Social Media, Cooperative Learning, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Deveci Topal, Arzu; Kolburan Gecer, Aynur – Educational Research and Reviews, 2015
The development of web 2.0 technology has resulted in an increase in internet sharing. The scope of this study is social networking, which is one of the web 2.0 tools most heavily used by internet users. In this paper, the unethical behaviours that preservice teachers encounter on social networks and the ways to deal with these problems are…
Descriptors: Preservice Teachers, Ethics, Social Networks, Web 2.0 Technologies
Peer reviewed Peer reviewed
Direct linkDirect link
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond – Education and Information Technologies, 2015
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Descriptors: Foreign Countries, Crime, Computer Security, Crime Prevention
Pages: 1  |  ...  |  43  |  44  |  45  |  46  |  47  |  48  |  49  |  50  |  51  |  ...  |  109