NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 62 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Peer reviewed Peer reviewed
Direct linkDirect link
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Connie D. Howard – ProQuest LLC, 2021
This qualitative study contributes to the limited body of knowledge on cybersecurity in middle schools beyond awareness programs. The purpose was to develop a pilot training module for middle school students comprising an analysis of public documents to examine what topics should be included in a pilot training program to reduce problematic cyber…
Descriptors: Program Development, Pilot Projects, Middle School Students, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Subasi, Sibel; Korkmaz, Özgen; Çakir, Recep – International Journal of Technology in Education and Science, 2023
The aim of this study is to examine the digital footprint awareness of students while surfing on cyberbullying, cyber security and social networks with demographic data such as class, school, gender, internet usage level. This research was carried out using a descriptive survey model. The study group of the research consisted of 467 volunteer…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Secondary School Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Peer reviewed Peer reviewed
Direct linkDirect link
Desmet, Ophélie A.; Crimmins, Danielle M.; Flewellen, Gerniya; Seigfried-Spellar, Kathryn C. – Gifted Child Today, 2023
The purpose of the present study was to evaluate a cybersecurity and digital forensics enrichment program for gifted and talented students to determine students' perceptions of this enrichment course. We evaluated data from 25 secondary education students and one educator to examine their perceptions of the program. Responses from students and the…
Descriptors: Academically Gifted, Secondary School Students, Student Attitudes, Program Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Israel Mbekezeli Dabengwa; Sibonile Moyo; Smart Ncube; Tinashe Byron Gashirai; Daga Makaza; Paul Makoni; Notice Pasipamire; Goodwill Kudakwashe Chademana; Mufudzi Mafoti; Stonard Mapfumo; Dzikamayi Mandaza – Cogent Education, 2024
This paper presents a study that investigates digital competencies within the Zimbabwean secondary education system. Limited research has focused on Zimbabwe's secondary schoolteachers' digital literacy in online learning. The study utilised DigComp 2.2 as the framework, and employed a multi-method participative approach to collect data from…
Descriptors: Foreign Countries, Technological Literacy, Secondary School Teachers, Online Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Burrows, Andrea C.; Borowczak, Mike; Mugayitoglu, Bekir – Education Sciences, 2022
Computer science, cybersecurity education, and microcredentials are becoming more pervasive in all levels of the educational system. The purpose of this study was partnering with precollegiate teachers: (1) to investigate the self-efficacy of 30 precollegiate teacher participants towards computer science before, during, and after three iterations…
Descriptors: Computer Science Education, Computer Security, Coding, Partnerships in Education
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tessa Consoli – Frontline Learning Research, 2024
Based on a national survey of 8,915 students, this study examines the prevalence of different types of media education practices in Swiss upper secondary schools and their relationship with students' online civic engagement and respectful online behavior. Descriptive statistics reveal that schools place little emphasis on media education and that…
Descriptors: Media Education, Teaching Methods, Differences, Citizen Participation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sidauruk, Tumiar; Delita, Fitra; Berutu, Nurmala; Yenny, Novida; Suciani, Ayu – International Journal of Technology in Education and Science, 2022
Technology needs to be integrated with every learning process. Moreover, the COVID-19 pandemic situation does not allow face-to-face learning in class. Therefore, online education has become the primary choice. However, online learning itself comes with challenges from the perspective of the teachers and their students. This study aims to analyze…
Descriptors: Program Implementation, Barriers, Electronic Learning, Technology Integration
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5