Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 22 |
Since 2016 (last 10 years) | 39 |
Since 2006 (last 20 years) | 75 |
Descriptor
Source
Author
Publication Type
Education Level
Location
United States | 4 |
Florida | 3 |
Greece | 3 |
New York | 3 |
United Kingdom | 3 |
Asia | 2 |
Australia | 2 |
California | 2 |
Maryland | 2 |
Missouri | 2 |
New York (New York) | 2 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
Social Security | 1 |
Assessments and Surveys
ACT Assessment | 1 |
Program for International… | 1 |
What Works Clearinghouse Rating
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Philip Newton; Maira Xiromeriti – Assessment & Evaluation in Higher Education, 2024
Media coverage suggests that ChatGPT can pass examinations based on multiple choice questions (MCQs), including those used to qualify doctors, lawyers, scientists etc. This poses a potential risk to the integrity of those examinations. We reviewed current research evidence regarding the performance of ChatGPT on MCQ-based examinations in higher…
Descriptors: Multiple Choice Tests, Artificial Intelligence, Integrity, Computer Software
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Sharman, Jonathan; Acemyan, Claudia Ziegler; Kortum, Philip; Wallach, Dan – International Journal of Computer Science Education in Schools, 2021
Software security is inevitably dependent on developers' ability to to design and implement software without security bugs. Perhaps unsurprisingly, developers often fail to do this. Our goal is to understand this from a usability perspective, identifying how we might best train developers and equip them with the right software tools. To this end,…
Descriptors: Teaching Methods, Computer Science Education, Undergraduate Students, Computer Software
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Liew, Tze Wei; Pang, Wei Ming; Leow, Meng Chew; Tan, Su-Mae – Smart Learning Environments, 2022
Emotional design refers to imbuing a multimedia learning environment with design attributes that promote learners' positive affect and motivation to enhance learning. One such feature is anthropomorphism, in which human-like attributes are infused into learning elements in a multimedia learning environment. This study examines the affective,…
Descriptors: Multimedia Instruction, Instructional Design, Multimedia Materials, Human Body
Juliana E. Raffaghelli; Bonnie Stewart – OTESSA Conference Proceedings, 2021
In the higher education context, an increasing concern on the technical or instrumental approach permeates attention to academics' data literacies and faculty development. The need for data literacy to deal specifically with the rise of learning analytics in higher education has been raised by some authors, though in spite of some focus on the…
Descriptors: Statistics Education, Faculty Development, Higher Education, Learning Analytics
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education