Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 9 |
Descriptor
Source
Education and Information… | 2 |
ProQuest LLC | 2 |
Cogent Education | 1 |
Decision Sciences Journal of… | 1 |
IEEE Transactions on Education | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Author
Abrantes, Bruno F. | 1 |
Alkaabi, Shamma | 1 |
Baggili, Ibrahim | 1 |
Balon, Tyler | 1 |
Bowen, Debra | 1 |
El Sayed, Hesham | 1 |
Freeman, Michael | 1 |
Gibbons, Deborah E. | 1 |
Jaurez, James | 1 |
Jones, Nancy | 1 |
Joshua Lee Brunty | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 4 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Information Analyses | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Location
Denmark | 1 |
European Union | 1 |
India | 1 |
United Arab Emirates | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
Workman, Michael D.; Luevanos, J. Anthony; Mai, Bin – IEEE Transactions on Education, 2022
Contribution: Based on a previous exploratory study, this research further investigated learning mode contributions from simulations and live competitive activities compared to a traditional classroom, laboratory, and testing approach to instruction in order to assess the applied behavioral contributions of each. Background: Cybersecurity…
Descriptors: Computer Security, Information Security, Computer Science Education, Simulation
Bowen, Debra; Jaurez, James; Jones, Nancy; Reid, William; Simpson, Christopher – Journal of Cybersecurity Education, Research and Practice, 2022
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational…
Descriptors: Computer Security, Information Security, Educational Resources, Elementary Secondary Education
Kevin McLaughlin – ProQuest LLC, 2023
The emerging impact of gamification in the field of education has generated several possible avenues for enhancing learning outcomes and raised a large number of as-yet unanswered questions as to the effectiveness of different gamification techniques in different contexts. This quantitative survey study examines the impact of gamification on…
Descriptors: Computer Science Education, Computer Security, Information Security, Game Based Learning
Gibbons, Deborah E.; Freeman, Michael – Decision Sciences Journal of Innovative Education, 2022
Multirole online games offer advantages for learning in business schools, as students process information and coordinate with others while pursuing measurable goals. Gaming environments can be complex, and the choices and timing of players' actions may have long-term effects on the state of the game. Team members practice communication skills as…
Descriptors: Decision Making, Group Dynamics, Computer Games, Educational Games
Sunita Dwivedi; Shinu Vig – Cogent Education, 2024
This study aims to understand the challenges in adoption of blockchain technology in higher education institutions in India using the technological-organizational-environmental (TOE) framework. Blockchain brings transparency, efficiency in working systems, and leveraging trust. The benefits of blockchain are multifaceted and might be beneficial to…
Descriptors: Foreign Countries, Information Technology, Educational Technology, Higher Education
Abrantes, Bruno F.; Venkataraman, Anuradha – International Journal of Learning and Change, 2022
Strategy theory recognises outer general environmental mutations in the legal landscape as compelling dynamic forces of business competition. Thus, the latest EU directive on data protection constitutes an uncharted event for testing organisational adaptability. This research aims to understand the impact of GDPR and the endeavours towards the…
Descriptors: Foreign Countries, Content Analysis, Generalization, Business Administration
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education