Publication Date
In 2025 | 0 |
Since 2024 | 7 |
Descriptor
Source
Education and Information… | 2 |
Journal of Cybersecurity… | 2 |
Editorial Projects in… | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
Author
Ankur Chattopadhyay | 1 |
Brady D. Lund | 1 |
Bui Thanh Hung | 1 |
Gayatri Parasa | 1 |
Hrishikesh Bhide | 1 |
Lidong Wang | 1 |
Prasun Chakrabarti | 1 |
S. Siva Shankar | 1 |
Samuel C. Yang | 1 |
Tulika Chakrabarti | 1 |
Tyler Poe | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 5 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hrishikesh Bhide – ProQuest LLC, 2024
The meteoric rise in software and technology has altered the paradigm of information security and privacy. Classified information, stored earlier behind locked doors, is now stored on the internet on servers that can be accessed from anywhere on the globe. As a result of these advancements, we are now vulnerable to cyber-attacks. Cyber-attacks are…
Descriptors: Game Based Learning, Learning Strategies, Computer Security, Computer Science Education
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Editorial Projects in Education, 2024
Blended learning combines traditional classroom instruction with online learning, offering personalized and engaging educational experiences. This Spotlight will help you analyze key research on school tech use; review expert tips for staying ahead of tech trends; explore strategies for engaging virtual instruction; examine how to use tech to meet…
Descriptors: Blended Learning, Technology Uses in Education, Student Needs, Educational Technology