NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nicolai Plintz; Dirk Ifenthaler – International Association for Development of the Information Society, 2024
This study aims to develop a preliminary model for the content validation of serious games, specifically to assess two cybersecurity games designed for children aged 8-13 years as part of the Erasmus+ project "SuperCyberKids". Using a scoping review of databases from pedagogy, psychology, and computer science, we identified current…
Descriptors: Computer Security, Educational Games, Computer Uses in Education, Game Based Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Saglam, Rahime Belen; Miller, Vincent; Franqueira, Virginia N. L. – IEEE Transactions on Education, 2023
Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. Research Questions: 1. What cyber security…
Descriptors: Computer Science Education, Computer Security, Children, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paul Wagner; Dalal Alharthi – Journal of Cybersecurity Education, Research and Practice, 2024
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that…
Descriptors: Artificial Intelligence, Computer Simulation, Information Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Paiva, José Carlos; Leal, José Paulo; Figueira, Álvaro – ACM Transactions on Computing Education, 2022
Practical programming competencies are critical to the success in computer science (CS) education and go-to-market of fresh graduates. Acquiring the required level of skills is a long journey of discovery, trial and error, and optimization seeking through a broad range of programming activities that learners must perform themselves. It is not…
Descriptors: Automation, Computer Assisted Testing, Student Evaluation, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jason H. Sharp; John E. Anderson; Guido Lang – Information Systems Education Journal, 2025
The "Information Systems Education Journal" has published uninterrupted since 2003. Over its publication history, it has covered myriad topics related to information systems education including model curriculum, outcomes assessment, online learning, capstone courses, service learning, data analytics, and cybersecurity, just to name a…
Descriptors: Information Systems, Computer Science Education, Educational Research, Bibliometrics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ashley Kenway; Phil Wilkinson; Kieron Dowden-Smith – International Journal for Students as Partners, 2019
This article explores issues of student identity and identification through a third-space theory lens. In addition, it positions this use of third-space theory as contributory to Students-as-Partners (SaP) approaches to teaching and learning. Naturally, this research was constructed as a SaP project, and research was undertaken as a collaboration…
Descriptors: Self Concept, Undergraduate Students, Student Attitudes, Resistance (Psychology)
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Khosrowpour, Mehdi; Amoroso, Donald – 1991
With the realization that microcomputers provide an extraordinary value to the organization follows the need to address a variety of issues in order to more effectively manage these resources. Each of the 14 chapters, consisting of papers written by different authors, represents a different perspective existing in organizations with respect to the…
Descriptors: Administration, Artificial Intelligence, Computer Science Education, Computer Security