Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
Author
Wang, Jianjun | 2 |
Adorjan, Michael | 1 |
Ankur Chattopadhyay | 1 |
Aytaç, Tufan | 1 |
Bhuyan, Jay | 1 |
Borowczak, Mike | 1 |
Burrows, Andrea Carneal | 1 |
Cooley, Rafer | 1 |
Erdem, Mustafa | 1 |
Griffiths, Barry J. | 1 |
Hur, Jung Won | 1 |
More ▼ |
Publication Type
Reports - Research | 9 |
Journal Articles | 8 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Secondary Education | 10 |
High Schools | 7 |
Junior High Schools | 3 |
Middle Schools | 3 |
Elementary Secondary Education | 2 |
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Grade 10 | 1 |
Grade 11 | 1 |
Audience
Location
California | 2 |
Canada | 1 |
Florida | 1 |
Nigeria | 1 |
Singapore | 1 |
Turkey (Ankara) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Jiow, Hee Jhee; Mwagwabi, Florence; Low-Lim, Anita – Journal of Media Literacy Education, 2021
This study adopts an experimental design to investigate the effectiveness of a password hygiene training programme. The password hygiene training programme adopted the Protection Motivation Theory's framework in its development, and was delivered online to 84 students aged 13 to 16. Strength of password measures, such as time taken, and number of…
Descriptors: Media Literacy, Information Security, Teaching Methods, Instructional Effectiveness
Olorunsola, Stephen; Ogwueleka, Francisca – International Journal of Education and Development using Information and Communication Technology, 2021
Modern technology has brought about a revolution in the communication process. The revolution started with the emergence of desktop computers in the 1980's. Today, the Internet and social media have brought about a 360-degree change in the communication process. The purpose of this study is to examine the perception of secondary school teachers in…
Descriptors: Teacher Attitudes, Educational Technology, Technology Uses in Education, Program Effectiveness
Adorjan, Michael; Ricciardelli, Rosemary – Learning, Media and Technology, 2019
While previous research identifies skepticism and some animosity among students towards school-based cyber-safety programs, drawing from focus group discussions with Canadian teens, this paper contributes to unpacking reasons for both support for 'what works' and antagonism for what is perceived to be lacking. Our findings reveal support for…
Descriptors: Information Security, Computer Security, Criticism, High School Students
Wolf, Shaya; Burrows, Andrea Carneal; Borowczak, Mike; Johnson, Mason; Cooley, Rafer; Mogenson, Kyle – Education Sciences, 2020
Research on innovative, integrated outreach programs guided three separate week-long outreach camps held across two summers (2018 and 2019). These camps introduced computer science through real-world applications and hands-on activities, each dealing with cybersecurity principles. The camps utilized low-cost hardware and free software to provide a…
Descriptors: Outreach Programs, Summer Programs, Camps, Program Length
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Bhuyan, Jay; Wu, Fan; Thomas, Cassandra; Koong, Kai; Hur, Jung Won; Wang, Chih-hsuan – TechTrends: Linking Research and Practice to Improve Learning, 2020
This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the…
Descriptors: Teaching Methods, Grade 10, Grade 11, High School Students
Griffiths, Barry J. – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2015
For countries to remain competitive in the global economy, it is important to cultivate the next generation of native mathematicians. However, this goal has been increasingly challenging in the United States where, despite the tremendous increase in university enrollment during recent decades, the number of students studying mathematics has…
Descriptors: Summer Programs, Mathematics Education, Program Effectiveness, Academically Gifted
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Wang, Jianjun – Grantee Submission, 2013
On September 22, 2012, NSF announced its decision to fund a three-year project, "Models for Information Assurance Education and Outreach" (MIAEO). In the first year of grant operation, MIAEO has invited 18 high school students, two K-12 teachers, and two CSUB student assistants to conduct research explorations in the fields of…
Descriptors: Information Security, Computer Science Education, Improvement Programs, Program Effectiveness