NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 451 to 465 of 1,635 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Kam, Hwee-Joo; Katerattanakul, Pairin – Journal of Information Technology Education: Innovations in Practice, 2019
Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to…
Descriptors: Academic Achievement, Learner Engagement, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Roll, Michael J. J.; Ifenthaler, Dirk – Empirical Research in Vocational Education and Training, 2021
Developments of Industry 4.0 require a set of multidisciplinary digital competencies for future vocational teachers, consisting of specific knowledge, motivational aspects, cognitive abilities and skills to fulfill the demands of digitally interconnected work situations. The competence model that is adapted from future work scenarios of vocational…
Descriptors: Vocational Education Teachers, Teacher Competencies, Technological Literacy, Information Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Juliana E. Raffaghelli; Bonnie Stewart – OTESSA Conference Proceedings, 2021
In the higher education context, an increasing concern on the technical or instrumental approach permeates attention to academics' data literacies and faculty development. The need for data literacy to deal specifically with the rise of learning analytics in higher education has been raised by some authors, though in spite of some focus on the…
Descriptors: Statistics Education, Faculty Development, Higher Education, Learning Analytics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mary Beth Klinger – Journal of Cybersecurity Education, Research and Practice, 2024
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students' sense of belonging and connectedness in the…
Descriptors: Computer Security, Sense of Community, Associate Degrees, Community College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Green, Nathan; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2020
Finding the first full-time, major-related job is a challenge faced by most college students, particularly those who have not gained much working experience before entering the job market. This challenge is amplified for the students majoring in Information Technology (IT), and cybersecurity in particular, due to the constantly changing technology…
Descriptors: Information Technology, Resumes (Personal), College Graduates, Employment Potential
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Payne, Brian K.; He, Wu; Wang, Cong; Wittkower, D. E.; Wu, Hongyi – Journal of Information Systems Education, 2021
This paper describes an interdisciplinary effort involving faculty from five different disciplines who came together to develop an interdisciplinary, open, general education cybersecurity course. The course, Cybersecurity, Technology, and Society, brings together ideas from interdisciplinary studies, information technology, engineering, business,…
Descriptors: Computer Security, Interdisciplinary Approach, Curriculum Development, General Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Raposo-Rivas, Manuela; Martínez-Figueira, María-Esther; Sarmiento Campos, José Antonio; Parrilla Latas, Angeles – Digital Education Review, 2021
Adolescents' relationship with technology is controversial both because of the possibilities it offers and because of the risks it entails, even being perceived by them as a real need. In order to improve the knowledge about it, a non-experimental research of transversal style has been carried out using a methodology based on data mining. 1,048…
Descriptors: Adolescents, Student Behavior, Secondary School Students, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Pangrazio, Luci; Selwyn, Neil – Pedagogy, Culture and Society, 2021
The ongoing 'datafication' of contemporary society has a number of implications for schools and schooling. One is the increasing calls for schools to help develop young people's understandings about the role that digital data now plays in their everyday lives -- especially in terms of the 'data economy' and 'surveillance capitalism'. Reporting on…
Descriptors: Data Collection, Data Analysis, Technology Uses in Education, Data Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Callicott, Katie; Thomas, Sian; Lee, Rob – Educational & Child Psychology, 2021
Aim: From March 2020, in-person visits to family homes have not been possible within the authors' educational psychology service (EPS) due to the Coronavirus pandemic. This paper outlines how Video Interaction Guidance (VIG) practitioners working within the authors' educational psychology service have adapted their practice to implement VIG…
Descriptors: COVID-19, Pandemics, Interaction, Educational Psychology
Rice, Jeffrey Philip – ProQuest LLC, 2021
Using the lived experiences of study participants, the purpose of the exploratory qualitative study was to explore collegiate cybersecurity instructors' qualities needed to maximize the engagement of Generation Z cybersecurity learners to successfully become cybersecurity specialists. This understanding is important in order to increase the…
Descriptors: Information Security, Computer Security, Age Groups, Specialists
Deloris Y. McBride – ProQuest LLC, 2021
As the global need for unfilled cybersecurity positions is projected to reach nearly 3.5 million by 2021, cybercrime proliferates. Talent shortage in cybersecurity continues to reach widespread magnitudes and individuals are inadequately prepared to assume positions requiring significant responsibilities. The challenge of filling the cybersecurity…
Descriptors: Computer Security, Curriculum Design, Career Readiness, Job Skills
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Pages: 1  |  ...  |  27  |  28  |  29  |  30  |  31  |  32  |  33  |  34  |  35  |  ...  |  109