NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dana Kube; Sebastian Gombert; Brigitte Suter; Joshua Weidlich; Karel Kreijns; Hendrik Drachsler – Journal of Computer Assisted Learning, 2024
Background: Gender stereotypes about women and men are prevalent in computer science (CS). The study's goal was to investigate the role of gender bias in computer-supported collaborative learning (CSCL) in a CS context by elaborating on gendered experiences in the perception of individual and team performance in mixed-gender teams in a hackathon.…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Gender Issues, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Burrows, Andrea C.; Borowczak, Mike; Mugayitoglu, Bekir – Education Sciences, 2022
Computer science, cybersecurity education, and microcredentials are becoming more pervasive in all levels of the educational system. The purpose of this study was partnering with precollegiate teachers: (1) to investigate the self-efficacy of 30 precollegiate teacher participants towards computer science before, during, and after three iterations…
Descriptors: Computer Science Education, Computer Security, Coding, Partnerships in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thomas, Kevin M.; Ivy, Jessica; Cook, Kristin; Kelley, Robert R. – Journal of Cybersecurity Education, Research and Practice, 2022
The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers' technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ivy, Jessica; Kelley, Robert; Cook, Kristin; Thomas, Kevin – International Journal of Computer Science Education in Schools, 2020
Although many practicing teachers have not experienced teacher preparation programs that teach cyber security (Pusely & Sadera, 2011) or are familiar with cyber principles (Authors), embedding these ideas into instruction in a variety of content areas is essential for promoting cyber literacy and citizenship. This study explores a professional…
Descriptors: Secondary School Curriculum, High School Teachers, Middle School Teachers, Faculty Development
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tekerek, Mehmet; Tekerek, Adem – Online Submission, 2013
In this study, elementary and high school students' information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaras City, towns, small towns and villages of Kahramanmaras province.…
Descriptors: Foreign Countries, Elementary School Students, High School Students, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Boutnaru, Shlomi; Hershkovitz, Arnon – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2015
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…
Descriptors: Computer Software, Computer Security, Programming Languages, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Rursch, Julie A.; Luse, Andy; Jacobson, Doug – IEEE Transactions on Education, 2010
The IT-Adventures program is dedicated to increasing interest in and awareness of information technology among high school students using inquiry-based learning focused on three content areas: cyber defense, game design programming, and robotics. The program combines secondary, post-secondary, and industry partnerships in educational programming,…
Descriptors: Inquiry, Service Learning, Active Learning, High School Students
Previous Page | Next Page »
Pages: 1  |  2