Publication Date
| In 2015 | 1 |
| Since 2014 | 15 |
| Since 2011 (last 5 years) | 160 |
| Since 2006 (last 10 years) | 179 |
| Since 1996 (last 20 years) | 180 |
Descriptor
| Information Security | 181 |
| Privacy | 58 |
| Information Technology | 53 |
| Computer Security | 48 |
| Internet | 30 |
| Information Systems | 27 |
| Information Management | 26 |
| Access to Information | 24 |
| Foreign Countries | 24 |
| Higher Education | 23 |
| More ▼ | |
Source
Author
| Kingsley, Chris | 2 |
| Kruck, S. E. | 2 |
| Wang, Jianjun | 2 |
| Wang, Shudong | 2 |
| White, Barbara Jo | 2 |
| Willey, Lorrie | 2 |
| AL Faresi, Ahmed | 1 |
| Abdolahifard, Khadije | 1 |
| Adamo, Oluwayomi | 1 |
| Adamo-Villani, Nicoletta | 1 |
| More ▼ | |
Publication Type
Showing 1 to 15 of 181 results
Van Ouytsel, Joris; Walrave, Michel; Ponnet, Koen – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2014
Social media are at the heart of the daily communications of adolescents. In many cases, however, adolescents are unaware of the consequences of the long-term availability of their online personal information. Given the rising prevalence of online background checks on potential partners, college applicants, and job candidates, online search…
Descriptors: Reputation, Mass Media Use, Mass Media Effects, Adolescents
Jameson, Daphne A. – Business and Professional Communication Quarterly, 2014
When Chiquita Brands considered relocating its corporate headquarters, competing cities started Twitter campaigns to influence the decision by communicating directly with the chief executive officer. As he used the new microblogging channel, some of his previously private communication became public, some personal communication became…
Descriptors: Business Communication, Communication Strategies, Social Networks, Web 2.0 Technologies
Young, Donna – Educational Horizons, 2014
This author has often heard teachers refer to kids as "experts" when it comes to using technology. She has found, however, that, while they may be great at navigating a new app or figuring out how to use the latest gadget, kids are not experts when it comes to properly communicating and ethically handling everything that goes along with…
Descriptors: Citizenship Education, Teaching Models, Electronic Learning, Information Security
Little, Allison Dare – Reclaiming Children and Youth, 2014
A modern form of abuse of children by parents and foster parents is to use the identity of children in their care for their own financial benefit, such as accessing their unused social security numbers to secure credit. This article reviews examples and implications of this identity theft.
Descriptors: Deception, Child Abuse, Information Security, Children
Yang, Fang; Wang, Shudong – Turkish Online Journal of Educational Technology - TOJET, 2014
This research investigates East Asian students' perceptions towards e-learning privacy. The survey was first carried out in Japan (N1 = 255) and China (N2 = 307) in 2009. In 2012 the same survey was conducted again in these two countries but with different participants (N3 = 175, N4 = 63). To survey in different countries is to verify whether…
Descriptors: Foreign Countries, Student Attitudes, Educational Technology, Electronic Learning
Alberta Education, 2013
Cloud computing is Internet-based computing in which shared resources,
software and information are delivered as a service that computers or
mobile devices can access on demand. Cloud computing is already used
extensively in education. Free or low-cost cloud-based services are used
daily by learners and educators to support learning, social…
Descriptors: Internet, Educational Technology, Computer Uses in Education, Shared Resources and Services
Jacobson, Rebecca; Saultz, Andrew; Snyder, Jeffrey W. – Phi Delta Kappan, 2013
Recognizing the need for information in public education, Congress mandated in the No Child Left Behind Act (NCLB) that all states create and disseminate annual school performance report cards. A decade after NCLB passed, school report cards are widely available for nearly every school in the country. As the amount of school performance data…
Descriptors: Report Cards, Annual Reports, School Statistics, Public Education
Willey, Lorrie; White, Barbara Jo – Journal of Information Systems Education, 2013
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
Descriptors: Credit (Finance), Information Security, Retailing, Compliance (Legal)
Wang, Shudong; Smith, Simon – Language Learning & Technology, 2013
This paper describes an ongoing language-learning project, three years into its development. We examine both the feasibility and the limitations of developing English reading and grammar skills through the interface of mobile phones. Throughout the project, reading and grammar materials were regularly sent to students' mobile phones. Students…
Descriptors: Foreign Countries, Electronic Learning, Handheld Devices, Second Language Instruction
Hohnle, Steffen; Michel, Boris; Glasze, Georg; Uphues, Rainer – International Research in Geographical and Environmental Education, 2013
Young people in modern societies consciously (e.g. Facebook) or unconsciously (e.g. some Google services) produce a vast amount of geodata. Using relational databases, private companies are capable of creating very precise profiles of the individual user and his/her spatial practices from this data. This almost inevitably prompts questions…
Descriptors: Information Security, Geography, Privacy, Geography Instruction
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes

Peer reviewed
Direct link
