Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 11 |
Since 2016 (last 10 years) | 24 |
Since 2006 (last 20 years) | 72 |
Descriptor
Source
Author
Abdollah, Faizal Mohd | 2 |
Mahalingam, Sheila | 2 |
Sahib, Shahrin | 2 |
Wang, Jianjun | 2 |
Yang, Samuel C. | 2 |
Alhamdani, Wasim A. | 1 |
Alqarni, Amani | 1 |
Anderson, Catherine L. | 1 |
Anwar, M. | 1 |
Baijian Yang | 1 |
Bangert-Drowns, Robert | 1 |
More ▼ |
Publication Type
Education Level
Location
Australia | 3 |
California | 3 |
China | 2 |
India | 2 |
Israel | 2 |
New York (New York) | 2 |
Portugal | 2 |
Singapore | 2 |
Asia | 1 |
Brazil | 1 |
Connecticut | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
David R. E. Halla – ProQuest LLC, 2024
The study investigated the use of formalized cybersecurity apprenticeships as a means of workforce development to meet the needs of employers seeking to fill cybersecurity positions. The study employed a quantitative analysis using a constructivist grounded theory approach utilizing a survey with questions based on the findings of apprenticeships…
Descriptors: Computer Security, Labor Force Development, Apprenticeships, Models
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Bendler, Daniel; Felderer, Michael – ACM Transactions on Computing Education, 2023
Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the…
Descriptors: Models, Information Security, Computer Security, Competence
Owusu, Samuel – ProQuest LLC, 2023
Cybersecurity job roles and responsibilities constantly evolve due to technological advancements, complex infrastructure, and increasing cybersecurity threats and regulations. As a result, organizations require a highly skilled and experienced cybersecurity workforce in both the public and private sectors. Many colleges and universities offer…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Nataliia Telendii – ProQuest LLC, 2023
Education is a constantly evolving field that requires continuous professional development. While policymakers continue to implement school reforms, many of them depend on teachers' ability to learn and improve instruction to increase student learning. Teachers have a double role in educational reforms by being simultaneously subjects and objects…
Descriptors: Faculty Development, Program Design, Program Effectiveness, Computer Security
Mazlina Abdul Majid; Husnul Ajra; Mohammad Adam Ibrahim Fakhreldin; Md. Shohidul Islam; Khalid Adam Ismail Hammad – International Society for Technology, Education, and Science, 2023
One of the most persuasive technologies in developing universities' smart campus applications is the Internet of Things (IoT) technique. Deploying thousands of readily available devices connected to IoT systems by ignoring device vulnerabilities and threat strategies in smart campus infrastructure is exacerbating security challenges. Moreover,…
Descriptors: Educational Technology, Technology Uses in Education, Computer Security, Technological Literacy
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Yang, Samuel C. – Journal of Education for Business, 2021
Business schools can meet the increasingly multidisciplinary requirements of training cybersecurity professionals. But in developing curriculums, they face different cybersecurity curricular frameworks with diverse emphases. Using a meta-framework consisting of a 2x3 model and a 2x2 model, this study examines ten cybersecurity curricular…
Descriptors: Computer Security, Information Security, Business Administration Education, Curriculum Development
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Mongkonrat Chaiyadet; Pallop Piriyasurawong; Panita Wannapiroon – International Education Studies, 2024
The objective of this research is to develop and study the outcomes of developing the Ubiquitous Buddhism Learning Ecosystem for Proactive Buddhism Propagation for Digital Citizenship. The sample group used in the research consists of nine individuals selected through targeted sampling, comprising experts in the design and development of learning…
Descriptors: Buddhism, Models, Citizenship, Educational Philosophy
Business-Higher Education Forum, 2019
"Creating Purposeful Partnerships" offers insights into business-led regional talent ecosystems that facilitate access, alignment, and development of a prepared workforce with the skills necessary for companies' long-term success. The findings of this report serve as a playbook for CEOs and their executive teams for establishing…
Descriptors: Partnerships in Education, School Business Relationship, Higher Education, Teamwork
Harrison, Brynne – ProQuest LLC, 2018
Phishing has become a preferred method among cyber criminals looking to gain access to confidential information. Although most businesses and governmental organizations provide employees with some sort of cyber security training, there is a lack of research examining whether such training methods work to actually reduce susceptibility to…
Descriptors: Training Methods, Information Security, Computer Security, Money Management
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation