Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 9 |
Descriptor
Source
Computers in the Schools | 1 |
EDUCAUSE | 1 |
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Journal of Instructional… | 1 |
Office of Educational… | 1 |
PRIMUS | 1 |
Readiness and Emergency… | 1 |
Author
Ahlgrim-Delzell, Lynn | 1 |
Bacak, Julie | 1 |
Brooks, D. Christopher | 1 |
Byker, Erik Jon | 1 |
Clouse, Shawn | 1 |
David P. Bunde | 1 |
John F. Dooley | 1 |
Lawrence, Cameron | 1 |
Looney, Clayton | 1 |
Martin, Florence | 1 |
Pomerantz, Jeffrey | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 7 |
Journal Articles | 6 |
Reports - Research | 2 |
Guides - Classroom - Teacher | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 3 |
Elementary Education | 1 |
Audience
Teachers | 9 |
Administrators | 2 |
Parents | 1 |
Students | 1 |
Support Staff | 1 |
Location
Arizona (Phoenix) | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Individuals with Disabilities… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Saleh, Mohamad – Journal of Instructional Research, 2020
Having a clear teaching strategy is vital when it comes to improving students' retention and preserving their knowledge. Various general teaching approaches have been incorporated into the classrooms as ways of improving teaching and student learning. Some of these approaches proved to be effective and some are ineffective. In this study, I…
Descriptors: Teaching Methods, Computer Security, Instructional Effectiveness, STEM Education
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Zimmerle, Joanna C.; Wall, Anne S. – Computers in the Schools, 2019
Although the Children's Online Privacy Protection Act (COPPA) was enacted 20 years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children's personal data. Lengthy and oftentimes ambiguous policies…
Descriptors: Privacy, Computer Security, Computer Oriented Programs, Web Sites
Rossmiller, Zach; Lawrence, Cameron; Clouse, Shawn; Looney, Clayton – Information Systems Education Journal, 2017
Many entrepreneurs and small business owners lack disaster recovery plans, which minimize business disruptions caused by failures of critical technical systems. Typically, technology is not the main focus for a small business owner, as most of their time is spent focused on business operations. This case study demonstrates that when a business…
Descriptors: Emergency Programs, Crisis Management, Small Businesses, Planning
Office of Educational Technology, US Department of Education, 2023
This guide is designed to provide important resources and recommendations to support teacher implementation of digital learning. Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This guide will…
Descriptors: Teaching Guides, Teaching Methods, Technology Uses in Education, Learning Experience
Brooks, D. Christopher; Pomerantz, Jeffrey – EDUCAUSE, 2017
For the fourteenth year, the EDUCAUSE Center for Analysis and Research (ECAR) has conducted research on information technology and higher education's most important end users, undergraduate students. For the 2017 report, 43,559 students from 124 institutions in 10 countries and 40 U.S. states participated in the research. The quantitative findings…
Descriptors: Undergraduate Students, Information Technology, Technology Uses in Education, Use Studies