Publication Date
In 2025 | 1 |
Since 2024 | 7 |
Since 2021 (last 5 years) | 9 |
Descriptor
Computer Security | 9 |
Technology | 9 |
Information Security | 6 |
Computer Science Education | 3 |
Mathematics Education | 3 |
Cartoons | 2 |
Coding | 2 |
Foreign Countries | 2 |
Handheld Devices | 2 |
Preservice Teachers | 2 |
Privacy | 2 |
More ▼ |
Source
PRIMUS | 2 |
Education and Information… | 1 |
Informatics in Education | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
Journal of Research on… | 1 |
Journal of Technology and… | 1 |
ProQuest LLC | 1 |
Author
Christine Wusylko | 2 |
Zhen Xu | 2 |
Amber E. Benedict | 1 |
Bingbing Di | 1 |
Bright Siaw Afriyie | 1 |
Daniel L. Segal | 1 |
David Kocsis | 1 |
David P. Bunde | 1 |
Do Hyong Koh | 1 |
Evmorfia-Iro Bartzia | 1 |
Gang Zhao | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 5 |
Reports - Descriptive | 3 |
Tests/Questionnaires | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Elementary Education | 3 |
Early Childhood Education | 1 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Christine Wusylko; Zhen Xu; Kara M. Dawson; Pavlo D. Antonenko; Do Hyong Koh; Minyoung Lee; Amber E. Benedict; Swarup Bhunia – Journal of Research on Technology in Education, 2024
This article describes the use of a comic book to anchor a cryptology and cybersecurity curriculum for upper elementary students. Perceptions about the comic book from 138 students across 11 afterschool programs were examined using survey, classroom observation, and interviews. Data analysis revealed that the comic book created a…
Descriptors: Technology, Computer Security, Information Security, Cartoons
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Michael L. Schliep – ProQuest LLC, 2021
Communication privacy is constantly under threat from Nation State Adversaries (NSA). This has led many platforms, such as Facebook and Apple, to implement secure conversation cryptographic protocols in their messaging applications. However, many of the protocols do not provide provable security and do not provide other security guarantees about…
Descriptors: Privacy, Interpersonal Communication, Computer Mediated Communication, Social Media
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods