Publication Date
In 2025 | 5 |
Since 2024 | 32 |
Descriptor
Source
Author
A. Renee Staton | 1 |
Amjad Almusaed | 1 |
Ammar K. Albaaj | 1 |
Amy Esther Kuiken | 1 |
Amy J. Connolly | 1 |
Andrej Jerman Blažic | 1 |
Asaad Almssad | 1 |
Ayesha Juhi | 1 |
Borka Jerman Blažic | 1 |
Cathryn van Kessel, Editor | 1 |
Christian Metaxas | 1 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 2 |
Practitioners | 1 |
Location
Canada | 2 |
Europe | 2 |
Colorado (Colorado Springs) | 1 |
Egypt | 1 |
India | 1 |
Jordan | 1 |
New Mexico | 1 |
Pennsylvania (Philadelphia) | 1 |
South Africa | 1 |
Switzerland | 1 |
Thailand | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Thulasi M. Santhi; K. Srinivasan – IEEE Transactions on Learning Technologies, 2024
Cloud adoption in industrial sectors, such as process, manufacturing, health care, and finance, is steadily rising, but as it grows, the risk of targeted cyberattacks has increased. Hence, effectively defending against such attacks necessitates skilled cybersecurity professionals. Traditional human-based cyber-physical education is resource…
Descriptors: Artificial Intelligence, Information Security, Computer Security, Prevention
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Jane Henriksen-Bulmer; Emily Rosenorn-Lanng; Stevie Corbin-Clarke; Samuel Ware; Davide Melacca; Lee-Ann Fenge – Interactive Learning Environments, 2024
Game-based learning can be a useful tool for increasing engagement in topics that are typically not related to games such as privacy and staying safe online, yet, very few games exist that look at how we can passively teach audiences how to stay safe online. This paper presents a bespoke board game about privacy, aimed at young people aged 16-25…
Descriptors: Game Based Learning, Teaching Methods, Privacy, Safety
Lisa Bosman; Taofeek Oladepo; Ida Ngambeki – Journal of Research in Innovative Teaching & Learning, 2024
Purpose: Upon graduating from university, many engineers will work in new product development and/or technology adoption for continuous improvement and production optimization. These jobs require employees to be cognizant of ethical practices and implications for design. However, little engineering coursework, outside the traditional ABET…
Descriptors: Engineering Education, Ethics, Data, Information Security
Laura Czerniewicz; Jennifer Feldman – Learning, Media and Technology, 2024
The pressure towards digital education is felt everywhere including in places with extreme digital divides. Resource-constrained educational environments are particularly threatened by datification manifest in the dominant business models of surveillance capitalism as there is less room in such contexts to refuse the 'free' offerings from big tech…
Descriptors: Foreign Countries, Teaching Methods, Teacher Attitudes, Data
Yun Du – International Journal of Web-Based Learning and Teaching Technologies, 2024
This paper deeply discusses the transformation potential of integrating Internet big data into the pre-school education model in colleges and universities. Through in-depth analysis, we studied the challenges and opportunities faced by preschool education in colleges and universities, and discussed the innovative influence of big data technology…
Descriptors: Educational Innovation, Preschool Education, Data Analysis, Data Collection
Embracing Artificial Intelligence to Improve Self-Directed Learning: A Cybersecurity Classroom Study
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Daire Maria Ni Uanachain; Lila Ibrahim Aouad – Thresholds in Education, 2025
This chapter investigates the dual role of Generative AI (GenAI) in providing support and feedback to students and in reshaping formative and summative educational assessments, addressing both the burgeoning opportunities for enhancing teaching methodologies and the associated ethical challenges. There is a focus on the necessity for balanced…
Descriptors: Artificial Intelligence, Computer Software, Technology Integration, Teaching Methods
Amy Esther Kuiken – ProQuest LLC, 2024
The cybersecurity landscape in the United States has rapidly evolved, marked by risk and novel threats (Georgescu, 2021; Siraj et al., 2021). Today, security mindsets are "widely accepted in the computer security community as … essential … for successful cybersecurity practice" (Peterson, 2021, para. 1), valuable to aspiring…
Descriptors: Second Language Learning, Second Language Instruction, Information Security, Computer Security
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Christopher H. Clark, Editor; Cathryn van Kessel, Editor – Teachers College Press, 2025
Whether skeptical or enthusiastic about AI, every social studies educator will find something useful for their practice in this book. The introduction of widely available generative AI tools has caused a frenzy of both positive and negative reactions. Between utopian visions and apocalyptic predictions of AI's impact on education, there is a need…
Descriptors: Social Studies, Artificial Intelligence, Technology Uses in Education, Computer Software
Huiling Ma; Lilliati Ismail; Weijing Han – Education and Information Technologies, 2024
The advancement and application of Artificial Intelligence (AI) has introduced innovative changes in language learning and teaching. In particular, the widespread utilization of various chatbots as foreign language learning partners showcases their remarkable potential contribution to the field. Nevertheless, there are currently few studies that…
Descriptors: Bibliometrics, Artificial Intelligence, Computer Software, Second Language Learning