Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Colorado Department of Higher Education, 2022
C.R.S. 24-33.5-1905 (4) directs the Department of Higher Education (DHE, the Department) to prepare a report detailing progress made towards critical state cyber-security goals at institutions of higher education that received an appropriation through SB 18-086. Specifically, the report must include, at a minimum: (1) The number of faculty or…
Descriptors: Program Implementation, Educational Legislation, State Legislation, Computer Security
Buchanan, Rachel; Southgate, Erica; Smith, Shamus P. – Global Studies of Childhood, 2019
Teachers are under increased pressure to teach children digital skills, and parents are having to manage children's online presence as well as their offline lives. Much of the discussion surrounding the issue of children's digital footprints highlights the potential present and future risks that children could be exposed to. While parents and…
Descriptors: Parent Attitudes, Teacher Attitudes, Technological Literacy, Foreign Countries
Mongkonrat Chaiyadet; Pallop Piriyasurawong; Panita Wannapiroon – International Education Studies, 2024
The objective of this research is to develop and study the outcomes of developing the Ubiquitous Buddhism Learning Ecosystem for Proactive Buddhism Propagation for Digital Citizenship. The sample group used in the research consists of nine individuals selected through targeted sampling, comprising experts in the design and development of learning…
Descriptors: Buddhism, Models, Citizenship, Educational Philosophy
Kaikho Ashuni – Asian Journal of Distance Education, 2024
The digital age has opened up new and exciting opportunities for Open and Distance Learning (ODL) in universities. But, is going digital reinforcing the existing social inequalities? This qualitative research examines the three levels of digital divide and digital inequality among learners at India's National Open University, IGNOU. The findings…
Descriptors: Distance Education, Open Education, Open Universities, Social Justice
Whitelock, Denise; Edwards, Chris; Okada, Alexandra – Journal of Learning for Development, 2020
The EU-funded TeSLA project -- Adaptive Trust-based e-Assessment System for Learning (http://tesla-project.eu) -- has developed a suite of instruments for e-Authentication. These include face recognition, voice recognition, keystroke dynamics, forensic analysis and plagiarism detection, which were designed for integration within a university's…
Descriptors: Computer Security, Electronic Learning, Student Attitudes, Teacher Attitudes
Black, Michael; Chapman, Debra; Clark, Angela – Information Systems Education Journal, 2018
The Enhanced Virtual Laboratory (EVL) is the product of a Department of Defense grant to enhance outreach, research, and education for cyber security. Through web-based laboratories, EVL allows users to remotely experience interactive content with virtual machines inside a modern web browser providing constructivism-based, student-centered,…
Descriptors: Computer Security, Computer Simulation, Laboratories, Internet
Liu, Shuchang; Cai, Yan; Tu, Dongbo – Journal of Educational Measurement, 2018
This study applied the mode of on-the-fly assembled multistage adaptive testing to cognitive diagnosis (CD-OMST). Several and several module assembly methods for CD-OMST were proposed and compared in terms of measurement precision, test security, and constrain management. The module assembly methods in the study included the maximum priority index…
Descriptors: Adaptive Testing, Monte Carlo Methods, Computer Security, Clinical Diagnosis
Willy Ochaya – International Journal of Online Graduate Education, 2018
Cyberattacks have a similar global economic impact of a natural disaster such as Hurricane Katrina, according to Lloyds, the world's specialist insurance market of London report. According to Lloyd's of London, global cyberattacks pose a considerable risk to businesses, health service, and education, resulting in average economic losses of between…
Descriptors: Computer Security, Internet, Electronic Learning, Handheld Devices
Alexander, Rodney T. – ProQuest LLC, 2017
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…
Descriptors: Information Security, Statistical Analysis, Computers, Computer Security
Payne, Bryson R. – Journal of Cybersecurity Education, Research and Practice, 2019
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semiautonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number…
Descriptors: Computer Security, Motor Vehicles, Information Security, Artificial Intelligence
Office of Educational Technology, US Department of Education, 2023
Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This "School Leader Digital Learning Guide" is a resource to help school leaders consider, plan, fund, implement, maintain, and adapt…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Ivy, Jessica; Kelley, Robert; Cook, Kristin; Thomas, Kevin – International Journal of Computer Science Education in Schools, 2020
Although many practicing teachers have not experienced teacher preparation programs that teach cyber security (Pusely & Sadera, 2011) or are familiar with cyber principles (Authors), embedding these ideas into instruction in a variety of content areas is essential for promoting cyber literacy and citizenship. This study explores a professional…
Descriptors: Secondary School Curriculum, High School Teachers, Middle School Teachers, Faculty Development
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development

Peer reviewed
Direct link
