Publication Date
In 2025 | 2 |
Since 2024 | 4 |
Descriptor
Source
Education and Information… | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
Author
Alison Lui | 1 |
Catharina Womack | 1 |
Daniel L. Segal | 1 |
David Kocsis | 1 |
James G. Ward | 1 |
James McGibney | 1 |
Li-Jen Lester | 1 |
Morgan Shepherd | 1 |
Penny Orton | 1 |
Yaprak Dalat Ward | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Tests/Questionnaires | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Alison Lui; Catharina Womack; Penny Orton – Education and Information Technologies, 2025
This article critically evaluates the effects of the ACU Virtual Mobility (VM) Project Digital Information Security Course (DISC) programme on improving students' awareness of cyber security skills, pre and post the educational intervention. Our selected VM tool is Collaborative Online International Learning (COIL). Building on a conceptual…
Descriptors: Cooperative Learning, Electronic Learning, Foreign Countries, Information Security
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy