NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 16 to 30 of 1,087 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Miller, Louise – American Journal of Business Education, 2012
This paper describes a student project assignment used in an accounting information systems course. We are now truly immersed in the internet age, and while many required accounting information systems courses and textbooks introduce database design, accounting software development, cloud computing, and internet security, projects involving the…
Descriptors: Accounting, Information Systems, Internet, Database Management Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Majola, Moffat Xolani; Mudau, Patience Kelebogile – International Journal of Educational Methodology, 2022
South Africa, like other countries in the world, went into lockdown due to the Coronavirus disease (COVID-19) which meant closure of venue-based exam centres, university libraries and academic offices for more than three months. This encounter forced higher institutions of learning to review and reconfigure their assessment practices and conduct…
Descriptors: Teaching Experience, Computer Assisted Testing, Foreign Countries, Open Education
DeFranco, Joanna F. – Techniques: Connecting Education and Careers (J1), 2011
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Descriptors: Management Systems, Safety, Internet, Teachers
Davis, Whitney N. – ProQuest LLC, 2023
This program was developed to offer caretakers information and support in their role as gatekeepers for their children and preadolescent's consumption of technology. Information is offered via psychoeducation, research, and statistics concerning the trajectory and effects of unsupervised, passive, excessive, and/or counteractive interaction of…
Descriptors: Children, Adults, Technology Uses in Education, Computer Use
Peer reviewed Peer reviewed
Direct linkDirect link
Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L. – Educational Gerontology, 2010
Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…
Descriptors: Internet, Gender Differences, Older Adults, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kaban, Abdullatif – Athens Journal of Education, 2021
Do we care about the security on the internet environment the way we do in the daily life safety of our children? In order to answer this question, this study aims to reveal what kind of education is provided at school about using secure internet. In accordance with this purpose, Information Technologies and Software Course textbooks at primary…
Descriptors: Internet, Information Security, Information Technology, Textbooks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sidauruk, Tumiar; Delita, Fitra; Berutu, Nurmala; Yenny, Novida; Suciani, Ayu – International Journal of Technology in Education and Science, 2022
Technology needs to be integrated with every learning process. Moreover, the COVID-19 pandemic situation does not allow face-to-face learning in class. Therefore, online education has become the primary choice. However, online learning itself comes with challenges from the perspective of the teachers and their students. This study aims to analyze…
Descriptors: Program Implementation, Barriers, Electronic Learning, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Tu, Yun-Fang; Lai, Chiu-Lin; Hwang, Gwo-Jen; Chen, Chun-Kuei – Educational Technology Research and Development, 2021
Due to the rapid changes in global economic environments, enterprises have to continually enhance their business competitiveness. To improve business, planning educational training has been regarded as a channel to educate outstanding employees. Recently, most of the companies in the securities industry in Taiwan have adopted web-based educational…
Descriptors: Foreign Countries, Web Based Instruction, Finance Occupations, Continuing Education
Liu, Wayne W. – ProQuest LLC, 2011
Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…
Descriptors: Credentials, Trust (Psychology), Social Sciences, Confidentiality
Nikelshpur, Dmitry O. – ProQuest LLC, 2014
Similar to mammalian brains, Artificial Neural Networks (ANN) are universal approximators, capable of yielding near-optimal solutions to a wide assortment of problems. ANNs are used in many fields including medicine, internet security, engineering, retail, robotics, warfare, intelligence control, and finance. "ANNs have a tendency to get…
Descriptors: Artificial Intelligence, Networks, Computation, Topology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sharma, Vipin K.; Holbah, Wael A. – Arab World English Journal, 2022
The study investigates teachers' perceptions of the use of online language assessment (OLA) using technology and examines the scope of using online applications to validate the mode of assessment. It looks for EFL teachers' opinions of OLA to comprehend the many worries associated with the issues and improve the online assessment tools. The…
Descriptors: Language Teachers, Teacher Attitudes, English (Second Language), Second Language Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ioannis Oikonomidis; Chryssa Sofianopoulou – Pedagogical Research, 2023
To solve problems, specific skills are needed. Critical thinking can help develop such skills. It can contribute to improving problem-solving skills, developing communication skills and cultivating decision making skills. Critical thinking is considered to be a key pedagogical goal in education. Education of informatics and critical thinking have…
Descriptors: Foreign Countries, Critical Thinking, Thinking Skills, Problem Solving
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
State Educational Technology Directors Association, 2019
The 1990 Kentucky Education Reform Act (KERA) created the Kentucky Education Technology System (KETS) authorizing the Office of Education Technology (OET) within the Kentucky Department of Education (KDE) to provide internet access to all school districts. One of the key components included in the legislation was the development of a technology…
Descriptors: Elementary Secondary Education, Educational Technology, Internet, Access to Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  73