Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 17 |
Since 2006 (last 20 years) | 28 |
Descriptor
Source
Author
Botterman, Maarten | 2 |
Cremonini, Leon | 2 |
Ettedgui, Emile | 2 |
Graafland-Essers, Irma | 2 |
Woollard, John | 2 |
Akcay, Behiye | 1 |
Anderson, Jimmeka | 1 |
Atkinson, Al | 1 |
Bencheva, Nina | 1 |
Brooks, Rochelle | 1 |
Brown, Dane | 1 |
More ▼ |
Publication Type
Reports - Evaluative | 32 |
Journal Articles | 21 |
Books | 2 |
Numerical/Quantitative Data | 2 |
Collected Works - General | 1 |
Information Analyses | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Postsecondary Education | 32 |
Higher Education | 27 |
Elementary Secondary Education | 7 |
Adult Education | 3 |
Elementary Education | 1 |
Two Year Colleges | 1 |
Audience
Policymakers | 1 |
Practitioners | 1 |
Researchers | 1 |
Students | 1 |
Teachers | 1 |
Location
United States | 3 |
Maryland | 2 |
Switzerland | 2 |
Bangladesh | 1 |
Canada | 1 |
Colorado | 1 |
Europe | 1 |
Florida | 1 |
Greece | 1 |
Italy | 1 |
New Zealand | 1 |
More ▼ |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Elementary and Secondary… | 1 |
United Nations Convention on… | 1 |
Universal Declaration of… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
OConnor, T. J.; Brown, Dane; Jackson, Jasmine; Payne, Bryson; Schmeelk, Suzanna – Journal of Cybersecurity Education, Research and Practice, 2023
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to…
Descriptors: Computer Security, Computer Science Education, Gamification, Competition
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security
Saah Agyemang-Badu; Felisa Tibbitts; Sage Phillips – Current Issues in Comparative Education, 2024
The treatment of artificial intelligence (AI) in the field of education has so far been typically characterized by (a) information about how AI can assist educators in carrying out their work, and (b) concerns about the misuse of AI by learners, for example, concerning plagiarism. The links between AI and ethics within the field of education are…
Descriptors: Artificial Intelligence, Elementary Secondary Education, Higher Education, Ethics
Lam, Tsz Yiu; Dongol, Brijesh – Interactive Learning Environments, 2022
The properties of a blockchain such as immutability, provenance, and peer-executed smart contracts could bring a new level of security, trust, and transparency to e-learning. In this paper, we introduce our proof-of-concept blockchain-based e-learning platform developed to increase transparency in assessments and facilitate curriculum…
Descriptors: Information Technology, Web Based Instruction, Instructional Innovation, Electronic Learning
Burrell, Darrell Norman; Courtney-Dattola, Ashley; Burton, Sharon L.; Nobles, Calvin; Springs, Delores; Dawson, Maurice E. – International Journal of Information and Communication Technology Education, 2020
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own…
Descriptors: Internet, Instructional Improvement, Information Technology, Computer Security
Brown, Randy – Information Systems Education Journal, 2019
Information Security has been a challenge since humans began keeping information. With the advent of computerized data and computer networks, that challenge has increased dramatically. Not only are more breaches occurring, but public knowledge about those breaches is now commonplace adding to virtual hysteria concerning data and information…
Descriptors: Computer Security, Information Security, Professional Personnel, Specialists
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Laulaupea'alu, Siuta – Waikato Journal of Education, 2021
Learning online from home bubbles through the use of information communication technology (ICT) stretches the engagement and enactment of "va" (relational connections) between students and lecturers as well as Pacific people in the community. In this paper, "talanoa" is used to capture students' online learning experiences and…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Colorado Department of Higher Education, 2022
C.R.S. 24-33.5-1905 (4) directs the Department of Higher Education (DHE, the Department) to prepare a report detailing progress made towards critical state cyber-security goals at institutions of higher education that received an appropriation through SB 18-086. Specifically, the report must include, at a minimum: (1) The number of faculty or…
Descriptors: Program Implementation, Educational Legislation, State Legislation, Computer Security
Scarabottolo, Nello – International Association for Development of the Information Society, 2018
This paper compares the students enrolled to a three-year undergraduate, bachelor degree on Security of Computer Systems and Networks -- offered in traditional, classroom fashion as well as online at the University of Milan (Italy) -- in terms of results in exams of the various courses as well as in the final dissertation for obtaining the degree.…
Descriptors: Online Courses, Educational Technology, Technology Uses in Education, Undergraduate Students
Tsado, Lucy – Journal of Cybersecurity Education, Research and Practice, 2019
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not…
Descriptors: Information Security, National Security, Computer Security, Computer Science Education
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Saeed J. Roohani; Xiaochuan Zheng – Advances in Accounting Education: Teaching and Curriculum Innovations, 2019
With recent increases in cybersecurity incidents, it is imperative to supplement current accounting curriculum, equip accounting graduates with sufficient knowledge and skills to assess cybersecurity risk, and learn about controls to mitigate such risks. In this chapter, the authors describe 10 teaching modules, supported by 10 professionally…
Descriptors: Accounting, Professional Education, Business Administration Education, Risk