NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20251
Since 20246
Since 2021 (last 5 years)28
Since 2016 (last 10 years)52
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 52 results Save | Export
Emmanuel Wansi – ProQuest LLC, 2023
Shortages within the cybersecurity workforce are not new; fluctuations in supply and demand, fiscal and monetary constraints, and technological advances have influenced changes within the cybersecurity workforce nationally and globally. Cloud computing and the Internet of Things (IoT) impact many different cybersecurity roles within different…
Descriptors: Evaluation, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Zeinab Mohammed; Fatma Abdelgawad; Mamoun Ahram; Maha E. Ibrahim; Alya Elgamri; Ehsan Gamel; Latifa Adarmouch; Karima El Rhazi; Samar Abd ElHafeez; Henry Silverman – Research Ethics, 2024
Members of research ethics committees (RECs) face a number of ethical challenges when reviewing genomic research. These include issues regarding the content and type of consent, the return of individual research results, mechanisms of sharing specimens and health data, and appropriate community engagement efforts. This article presents the…
Descriptors: Research, Ethics, Committees, Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Liangqing Li – Education and Information Technologies, 2024
The purpose of the current article is to evaluate social responsibility, digital ethics, and knowledge about safe data storage among students of different ages. Four hundred students took part in the study: 200 people each in the first and fifth years of study. Their ages were 19.2 years (SD = 1.08) and 24.4 years (SD = 1.18), respectively. The…
Descriptors: Information Security, Social Responsibility, Ethics, Knowledge Level
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Labaran Isiaku; Ahmet Adalier – On the Horizon, 2025
Purpose: This study aims to investigate the challenges associated with the integration and implementation of blockchain technology in the education sector. The primary objective is to identify and categorize these challenges using the Technology-Organization-Environment (TOE) framework, shedding light on the technological, organizational and…
Descriptors: Literature Reviews, Technology Uses in Education, Information Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hagadone-Bedir, Mariah; Voithofer, Rick; Kulp, Jessica T. – British Journal of Educational Technology, 2023
This conceptual study uses dynamic systems theory (DST) and phenomenology as lenses to examine data privacy implications surrounding wearable devices that incorporate stakeholder, contextual and technical factors. Wearable devices can impact people's behaviour and sense of self, and DST and phenomenology provide complementary approaches for…
Descriptors: Privacy, Information Security, Assistive Technology, Systems Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Badie, Nasrin; Hussin, Ab Razak Che; Yadegaridehkordi, Elaheh; Singh, Dalbir; Lashkari, Arash Habibi – Education and Information Technologies, 2023
Cloud computing is the next generation of on-demand information technology services and products that deliver various applications over the Internet. Cloud computing is often adopted as a superior alternative by data centers to replace their current system. However, cloud computing services are still accompanied by many issues which hinder their…
Descriptors: Foreign Countries, Universities, Information Management, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rory McGreal – International Journal of E-Learning & Distance Education, 2023
Micro-credentials can provide easily accessible and transparent evidence of skills or knowledge that have been certified by an authority, based on small units of learning. The recognition and transfer of credits is becoming essential, as an increasing number of students are studying at different institutions, often at the same time, online or in…
Descriptors: Microcredentials, Information Storage, Databases, Technology Uses in Education
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Ishahe Alshanqiti – ProQuest LLC, 2021
Cloud computing has led to a huge shift in ideas and applications related to IT services. This is especially true in regard to infrastructure solutions that organizations rely on to facilitate their operations, as many businesses have found their way into this new system. Therefore, the aim of this study was to examine the factors that determine…
Descriptors: Educational Technology, Information Storage, College Faculty, Teacher Attitudes
Page, Kelly; Merritt Johnson, Alexandra; Franklin, Kristen; Carter, Bria; Galindo, Marilys; Solorzano, Teresa; Lee, Sangyeon; Shah, Zohal – Digital Promise, 2023
With the emergence of digital credentialing and platforms to support learners and workers with entering and traversing the increasingly skill-based education and workforce ecosystem, Learning and Employment Record (LER) technologies have been identified as a promising solution for individuals to share and access their learning- and skills-data and…
Descriptors: Information Technology, Credentials, Information Storage, Personnel Data
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Peer reviewed Peer reviewed
Direct linkDirect link
Hsu, Ching-Sheng; Tu, Shu-Fen; Chiu, Pei-Chia – Education and Information Technologies, 2022
Paper certificates are difficult to carry, easy to lose, easy to forge and with other security issues, which were not solved until the emergence of blockchain technology. Blockchain technology uses one-way hash functions, asymmetric encryption, digital signatures, consensus mechanisms and smart contracts to achieve decentralization, non-tampering…
Descriptors: Educational Certificates, Electronic Publishing, Human Body, Recognition (Psychology)
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4