Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 7 |
Descriptor
Source
Journal of Cybersecurity… | 2 |
ACM Transactions on Computing… | 1 |
Informatics in Education | 1 |
International Society for… | 1 |
ProQuest LLC | 1 |
SAGE Open | 1 |
Author
Abasi-amefon O. Affia | 1 |
Alexander Nolte | 1 |
Anna E. Kosloski | 1 |
Armstrong, Miriam E. | 1 |
Bingle, YuLin G. | 1 |
Brilingaite, Agne | 1 |
Bukauskas, Linas | 1 |
Caroline Sutton Chubb | 1 |
Cross, Bria | 1 |
Daniel Olson | 1 |
Jones, Keith S. | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 4 |
Books | 1 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kate Quintana; Caroline Sutton Chubb; Daniel Olson; Anna E. Kosloski – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has become increasingly important not only in the technology sector but in criminal justice professions as well, and significant challenges have arisen as a result. However, these challenges are not well discussed in the literature. To address this gap, and to study the cybersecurity trends impacting criminal justice professionals…
Descriptors: Computer Security, Knowledge Level, Criminal Law, Role Theory
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Armstrong, Miriam E.; Jones, Keith S.; Namin, Akbar Siami; Newton, David C. – ACM Transactions on Computing Education, 2020
More specialized cybersecurity education programs are needed to address workforce needs, but it is unclear which knowledge, skills, and abilities (KSAs) fulfil industry needs. We interviewed 48 professionals within four cyber defense specialty areas: (1) Cyber Network Defense Analysis, (2) Cyber Network Defense Infrastructure Support, (3) Incident…
Descriptors: Knowledge Level, Job Skills, Computer Security, Computer Science Education
Payne, Brian K.; Cross, Bria; Vandecar-Burdin, Tancy – Journal of Cybersecurity Education, Research and Practice, 2022
The value of academic advising has been increasingly emphasized in higher education. In this study, attention is given to the most significant types of advice that a sample of cybersecurity faculty and advisors from the Commonwealth of Virginia recommend giving to cybersecurity students. The results show that faculty and advisors recommended that…
Descriptors: Faculty Advisers, Academic Advising, Computer Security, Experience
Bingle, YuLin G. – ProQuest LLC, 2022
Despite assertions and increased discussions about the effectiveness of undergraduate cybersecurity education, the evidence has been primarily anecdotal. Dialogue about cybersecurity education has tended to focus more on technical skills and less on soft skills. This research effort contended that cybersecurity experts with technical skills also…
Descriptors: Computer Security, Information Security, Technological Literacy, Soft Skills
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Mack Shelley, Editor; Omer Tayfur Ozturk, Editor – International Society for Technology, Education, and Science, 2024
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on April 27-30, 2024, in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, discuss theoretical and…
Descriptors: STEM Education, Second Language Learning, Second Language Instruction, English (Second Language)