NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 481 to 495 of 1,635 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson, Clare – Higher Education Pedagogies, 2019
Higher Education institutions understand that there is a need to embed professional skills within degree programmes. However, evidence shows that graduates, whilst having developed good theoretical knowledge, lack experience and confidence when entering the workplace. Employers view the importance of degree-related skills as only a part of the…
Descriptors: Foreign Countries, Computer Security, Student Projects, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Al-araibi, Asma Ali Mosa; Naz'ri bin Mahrin, Mohd; Yusoff, Rasimah Che Mohd; Chuprat, Suriayati Binti – Education and Information Technologies, 2019
The rate of adoption of e-learning has increased significantly in most higher education institutions in the world. E-learning refers to the use of electronic media, educational technology, also; information and communication technology (ICT) in the educational process. The aim for adopting e-learning is to provide students with educational…
Descriptors: Electronic Learning, Learning Readiness, Educational Technology, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Keith Lee; Evo Popoff; David Walker – State Educational Technology Directors Association, 2025
The 2025 State Educational Technology Directors Association (SETDA) State EdTech Trends Survey explores how the systems, infrastructure, and staffing that digital learning depends on will be sustained, how new flexibilities in federal formula and discretionary funding can be leveraged, what edtech tools are essential, and how to balance innovation…
Descriptors: Educational Technology, Educational Trends, Technology Uses in Education, Elementary Secondary Education
Nowicki, Jacqueline M. – US Government Accountability Office, 2020
A cybersecurity incident is an event that actually or potentially jeopardizes a system or the information it holds. When a student's personal information is disclosed, it can lead to physical, emotional, and financial harm. Organizations are vulnerable to data security risks, including over 17,000 public school districts and approximately 98,000…
Descriptors: Information Security, Computer Security, Student Records, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Colorado Department of Higher Education, 2022
C.R.S. 24-33.5-1905 (4) directs the Department of Higher Education (DHE, the Department) to prepare a report detailing progress made towards critical state cyber-security goals at institutions of higher education that received an appropriation through SB 18-086. Specifically, the report must include, at a minimum: (1) The number of faculty or…
Descriptors: Program Implementation, Educational Legislation, State Legislation, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Buchanan, Rachel; Southgate, Erica; Smith, Shamus P. – Global Studies of Childhood, 2019
Teachers are under increased pressure to teach children digital skills, and parents are having to manage children's online presence as well as their offline lives. Much of the discussion surrounding the issue of children's digital footprints highlights the potential present and future risks that children could be exposed to. While parents and…
Descriptors: Parent Attitudes, Teacher Attitudes, Technological Literacy, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mongkonrat Chaiyadet; Pallop Piriyasurawong; Panita Wannapiroon – International Education Studies, 2024
The objective of this research is to develop and study the outcomes of developing the Ubiquitous Buddhism Learning Ecosystem for Proactive Buddhism Propagation for Digital Citizenship. The sample group used in the research consists of nine individuals selected through targeted sampling, comprising experts in the design and development of learning…
Descriptors: Buddhism, Models, Citizenship, Educational Philosophy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kaikho Ashuni – Asian Journal of Distance Education, 2024
The digital age has opened up new and exciting opportunities for Open and Distance Learning (ODL) in universities. But, is going digital reinforcing the existing social inequalities? This qualitative research examines the three levels of digital divide and digital inequality among learners at India's National Open University, IGNOU. The findings…
Descriptors: Distance Education, Open Education, Open Universities, Social Justice
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Whitelock, Denise; Edwards, Chris; Okada, Alexandra – Journal of Learning for Development, 2020
The EU-funded TeSLA project -- Adaptive Trust-based e-Assessment System for Learning (http://tesla-project.eu) -- has developed a suite of instruments for e-Authentication. These include face recognition, voice recognition, keystroke dynamics, forensic analysis and plagiarism detection, which were designed for integration within a university's…
Descriptors: Computer Security, Electronic Learning, Student Attitudes, Teacher Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Black, Michael; Chapman, Debra; Clark, Angela – Information Systems Education Journal, 2018
The Enhanced Virtual Laboratory (EVL) is the product of a Department of Defense grant to enhance outreach, research, and education for cyber security. Through web-based laboratories, EVL allows users to remotely experience interactive content with virtual machines inside a modern web browser providing constructivism-based, student-centered,…
Descriptors: Computer Security, Computer Simulation, Laboratories, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Shuchang; Cai, Yan; Tu, Dongbo – Journal of Educational Measurement, 2018
This study applied the mode of on-the-fly assembled multistage adaptive testing to cognitive diagnosis (CD-OMST). Several and several module assembly methods for CD-OMST were proposed and compared in terms of measurement precision, test security, and constrain management. The module assembly methods in the study included the maximum priority index…
Descriptors: Adaptive Testing, Monte Carlo Methods, Computer Security, Clinical Diagnosis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Willy Ochaya – International Journal of Online Graduate Education, 2018
Cyberattacks have a similar global economic impact of a natural disaster such as Hurricane Katrina, according to Lloyds, the world's specialist insurance market of London report. According to Lloyd's of London, global cyberattacks pose a considerable risk to businesses, health service, and education, resulting in average economic losses of between…
Descriptors: Computer Security, Internet, Electronic Learning, Handheld Devices
Alexander, Rodney T. – ProQuest LLC, 2017
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…
Descriptors: Information Security, Statistical Analysis, Computers, Computer Security
Pages: 1  |  ...  |  29  |  30  |  31  |  32  |  33  |  34  |  35  |  36  |  37  |  ...  |  109