NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Emmanuel Wansi – ProQuest LLC, 2023
Shortages within the cybersecurity workforce are not new; fluctuations in supply and demand, fiscal and monetary constraints, and technological advances have influenced changes within the cybersecurity workforce nationally and globally. Cloud computing and the Internet of Things (IoT) impact many different cybersecurity roles within different…
Descriptors: Evaluation, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Tingting Feng – Education and Information Technologies, 2024
The globalization of educational processes has intensified the introduction of interactive learning forms. Education systems around the world have undergone transformation, modernization, and innovation. These processes also implied the implementation of advanced technological tools to improve the quality of teaching various subjects, including…
Descriptors: Computer Storage Devices, Computer Software, Computer Oriented Programs, Influence of Technology