Publication Date
In 2025 | 1 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 12 |
Since 2006 (last 20 years) | 14 |
Descriptor
Computer Security | 14 |
Training | 14 |
Information Technology | 7 |
Information Security | 6 |
College Students | 5 |
Higher Education | 5 |
Computer Science Education | 4 |
Foreign Countries | 4 |
Computer Networks | 3 |
Teamwork | 3 |
Barriers | 2 |
More ▼ |
Source
ProQuest LLC | 5 |
Journal of Cybersecurity… | 3 |
Computer Science Education | 1 |
EDUCAUSE | 1 |
Excellence in Education… | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
US House of Representatives | 1 |
Author
Brown, Dane | 1 |
Carlin, Anna | 1 |
Chaimae Tnibar-Harrus | 1 |
Cherrise Ficke | 1 |
Ioana Boureanu | 1 |
Isabella Piasecki | 1 |
Isaias, Pedro, Ed. | 1 |
Jackson, Jasmine | 1 |
James Edwin Tippey Jr. | 1 |
Jamie Reeves | 1 |
Jenay Robert | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Dissertations/Theses -… | 5 |
Reports - Research | 5 |
Collected Works - Proceedings | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 14 |
Postsecondary Education | 12 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Early Childhood Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Florida | 2 |
California | 1 |
Cameroon | 1 |
Germany | 1 |
India | 1 |
Italy | 1 |
Maryland (Baltimore) | 1 |
Mexico | 1 |
Morocco | 1 |
Spain | 1 |
United Kingdom | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
OConnor, T. J.; Brown, Dane; Jackson, Jasmine; Payne, Bryson; Schmeelk, Suzanna – Journal of Cybersecurity Education, Research and Practice, 2023
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to…
Descriptors: Computer Security, Computer Science Education, Gamification, Competition
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Chaimae Tnibar-Harrus; María José Latorre-Medina – Excellence in Education Journal, 2025
The purpose of this study was to analyze digital competencies of student teachers in Early Childhood Education and Primary Education of the Faculty of Education, Economy and Technology of Ceuta of the University of Granada. Specifically, we investigated the degree of competence in digital ethics that future teachers acquire, develop and/or enhance…
Descriptors: Ethics, Technological Literacy, Early Childhood Teachers, Elementary School Teachers
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Jenay Robert; Nicole Muscanell; Nichole Arbino; Mark McCormack; Jamie Reeves – EDUCAUSE, 2024
This report profiles the trends and key technologies and practices shaping the future of cybersecurity and privacy, and envisions a number of scenarios for that future. It is based on the perspectives and expertise of a global panel of leaders from across the higher education landscape. These are, in many ways, tumultuous times. Global political…
Descriptors: Information Security, Computer Security, Privacy, Higher Education
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
US House of Representatives, 2018
This document records testimony from a joint meeting of the Subcommittee on Cybersecurity and Infrastructure Protection and the Subcommittee on Higher Education and Workforce Development regarding public-private solutions to educating a cyber workforce. Member statements were presented by: (1) Honorable John Ratcliffe, Chairman, Subcommittee on…
Descriptors: Labor Force Development, Computer Security, Higher Education, Hearings
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation