Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 7 |
Descriptor
Source
| Journal of Cybersecurity… | 2 |
| Computer Science Education | 1 |
| Journal of Applied Research… | 1 |
| NACTA Journal | 1 |
| Online Submission | 1 |
| Technology, Knowledge and… | 1 |
Author
| Abegaz, Tamirat | 1 |
| Agne Brilingaite | 1 |
| Anne M. Brown | 1 |
| B. Bagby | 1 |
| Dhanya Pramod | 1 |
| Eric K. Kaufman | 1 |
| Evita Roponena | 1 |
| Feras A. Batarseh | 1 |
| Heather Lindberg | 1 |
| Jackowicz, Stephen, Ed. | 1 |
| Janis Grabis | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 6 |
| Reports - Research | 3 |
| Reports - Descriptive | 2 |
| Books | 1 |
| Collected Works - Proceedings | 1 |
| Information Analyses | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Grade 1 | 1 |
| Kindergarten | 1 |
| Primary Education | 1 |
Audience
Location
| Virginia | 2 |
| Albania | 1 |
| China | 1 |
| Croatia | 1 |
| Kentucky | 1 |
| Maryland (Baltimore) | 1 |
| Morocco | 1 |
| North Carolina | 1 |
| Philippines | 1 |
| Portugal | 1 |
| Saudi Arabia | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dhanya Pramod – Journal of Applied Research in Higher Education, 2025
Purpose: The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and…
Descriptors: Gamification, Computer Security, Information Security, Training
Samson O. Adeoye; Heather Lindberg; B. Bagby; Anne M. Brown; Feras A. Batarseh; Eric K. Kaufman – NACTA Journal, 2023
Cyberbiosecurity is an emerging field at the convergence of life sciences and the digital world. As technological advances improve operational processes and expose them to vulnerabilities in agriculture and life sciences, cyberbiosecurity has become increasingly important for addressing contemporary concerns. Unfortunately, at this time,…
Descriptors: Computer Security, Biology, Biological Sciences, Labor Force Development
Ruta Pirta-Dreimane; Agne Brilingaite; Evita Roponena; Karen Parish; Janis Grabis; Ricardo Gregorio Lugo; Martinš Bonders – Technology, Knowledge and Learning, 2025
Incorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk…
Descriptors: Computer Security, Computer Science Education, Educational Games, Gamification
Moon, Tyler; Abegaz, Tamirat; Payne, Bryson; Salimi, Abi – Journal of Cybersecurity Education, Research and Practice, 2020
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal…
Descriptors: Information Security, Game Based Learning, Computer Security, Knowledge Level
Lesko, Charles J., Jr. – Journal of Cybersecurity Education, Research and Practice, 2019
Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the…
Descriptors: Needs Assessment, Computer Security, Design, Computer Centers
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students

Peer reviewed
Direct link
