NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 46 to 60 of 293 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Jensen, Jessica L. King; Rashid, Mariam; Ajith, Aniruddh; Jewett, Bambi; Hacker, Kiana; Phan, Lilianna; Choi, Kelvin; Chen-Sankey, Julia – Health Education & Behavior, 2023
We examined the prevalence and correlates of anticipated responses to hypothetical cigar price increases. Data are from a 2021 representative sample of U.S. adults who reported past-30-day cigar use (n = 454; mean age = 39.8 years). Weighted multivariable logistic regressions assessed the correlates of behavior change responses. If cigar price…
Descriptors: Smoking, Costs, Adults, Behavior Change
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Rafalow, Matthew H. – University of Chicago Press, 2020
In the digital age, schools are a central part of a nationwide effort to make access to technology more equitable, so that all young people, regardless of identity or background, have the opportunity to engage with the technologies that are essential to modern life. Most students, however, come to school with digital knowledge they've already…
Descriptors: Equal Education, Technology Uses in Education, Racial Bias, Social Bias
Peer reviewed Peer reviewed
Direct linkDirect link
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Pendergrass, William Stanley – ProQuest LLC, 2013
Interconnected computer information systems have become indispensable aspects of modern life. All forms of communication, education, finance, commerce and identity utilize these systems creating a permanent personal presence for all of us within this digital world. Individuals who reveal or threaten to reveal these personal identities for various…
Descriptors: Case Studies, Information Systems, Activism, Qualitative Research
Horspool, Agi – ProQuest LLC, 2013
Organizations have started using social media to support activities such as team collaboration and knowledge sharing, yet few researchers have systematically investigated the context and culture within which these implementations occur, nor the perceived impact according to organizational users. Additionally, researchers have not yet considered…
Descriptors: Social Media, Teamwork, Knowledge Management, Sharing Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Lee – Journal of Pre-College Engineering Education Research, 2015
The Maker Movement is a community of hobbyists, tinkerers, engineers, hackers, and artists who creatively design and build projects for both playful and useful ends. There is growing interest among educators in bringing making into K-12 education to enhance opportunities to engage in the practices of engineering, specifically, and STEM more…
Descriptors: Communities of Practice, Design, STEM Education, Engineering
Peer reviewed Peer reviewed
Direct linkDirect link
Hacker, Michael; Cavanaugh, Sandra; DeHaan, Chris; Longware, Alta Jo; McGuire, Matt; Plummer, Matthew – Technology and Engineering Teacher, 2018
This is the second of two articles about the National Science Foundation-funded Engineering for All (EfA) program which focuses on engineering as a potential social good, revisits major Technology and Engineering (T&E) themes (design, modeling, systems, resources, and human values) in two authentic social contexts (Food and Water), and uses…
Descriptors: Engineering Education, Curriculum Implementation, Middle School Students, STEM Education
Ware, Jennifer – New England Journal of Higher Education, 2018
The author suggests that inevitably, technology will cause harm, and she questions whom to hold responsible. The person who created the program or machine? The operator? The manufacturer? The marketer? The politician who passed legislation making it available? When bad things happen, people tend to look for a particular individual to blame,…
Descriptors: Information Technology, Safety, Information Security, Technological Advancement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Novoa, Mauricio – Design and Technology Education, 2018
This article discusses three years' research (2012-2014) on design education towards a 2016 undergraduate industrial design curriculum launch. It contributes a pathway for conservative courses towards design culture transformation and filling gaps between them and leading breakthrough education exemplars. The course proposes a collective knowledge…
Descriptors: Industrial Arts, Design, Teaching Methods, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Weinberger, Yehudith, Ed. – IntechOpen, 2018
As with most dynamic activities that are based on social and cultural contexts and rely on interactions, education is a complex and often ambiguous endeavor. Despite this complexity, scholars and educators are often required to find ways of defining and explaining what "good" teaching is and to incorporate these conclusions into teacher…
Descriptors: Teaching Methods, Faculty Development, Professional Continuing Education, Empowerment
Peer reviewed Peer reviewed
Direct linkDirect link
Langrehr, Kimberly J.; Yoon, Eunju; Hacker, Jason; Caudill, Kathy – Journal of Multicultural Counseling and Development, 2015
This study used a consensual qualitative research method to explore the implications of transnational adoption in the lives of 12 adult Korean adoptees. From the analysis, 6 domains emerged: (a) adoption history and preadoptive memories, (b) meaning of adoption, (c) adoptive family dynamics, (d) racism, (e) identity formation, and (f) counseling…
Descriptors: Adoption, Qualitative Research, Adults, Korean Americans
Peer reviewed Peer reviewed
Direct linkDirect link
Lanford, Michael – Policy Reviews in Higher Education, 2017
Since its first announcement on 22 September 1992, the HOPE (Helping Outstanding Pupils Educationally) scholarship program's influence on state policy and American higher education has been remarkable. Nevertheless, the Georgia HOPE scholarship is also worthy of critical interrogation. This paper examines the conception and implementation of the…
Descriptors: Educational History, Scholarships, State Policy, Politics of Education
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  20