Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 5 |
| Since 2007 (last 20 years) | 8 |
Descriptor
Source
| Journal of Information… | 2 |
| International Journal of… | 1 |
| Journal of Cybersecurity… | 1 |
| Journal of Educational… | 1 |
| Journal of Science Education… | 1 |
| Quarterly Review of Distance… | 1 |
| TechTrends: Linking Research… | 1 |
Author
| Chandrasekhar, Arcot | 1 |
| Christine Wusylko | 1 |
| Espiritu, Baltazar | 1 |
| Gruener, Gregory | 1 |
| Harris, Mark A. | 1 |
| Hoyt, Amy | 1 |
| Huibin Zhang | 1 |
| Jin Xin Matilda Ho | 1 |
| Kara M. Dawson | 1 |
| Kim Chwee Daniel Tan | 1 |
| Mary Beth Klinger | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 8 |
| Reports - Research | 5 |
| Reports - Evaluative | 2 |
| Reports - Descriptive | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 6 |
| Postsecondary Education | 4 |
| Elementary Education | 1 |
| Two Year Colleges | 1 |
Audience
| Teachers | 1 |
Location
| China | 1 |
| District of Columbia | 1 |
| Idaho | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tang Wee Teo; Sherwin John San Buenaventura Mabulo; Kim Chwee Daniel Tan; Jin Xin Matilda Ho; Xue Xian Thea Tan – Journal of Science Education and Technology, 2025
STEM (science, technology, engineering, mathematics) hackathons have been conducted to offer opportunities for diverse participants to work collaboratively and intensely on tasks within a short period. However, most literature about hackathons does not offer theoretical discussions on the affordances of such learning contexts for school students.…
Descriptors: Epistemology, STEM Education, Computer Security, Programming
Zhen Xu; Christine Wusylko; Pasha Antonenko; Kara M. Dawson; Huibin Zhang – TechTrends: Linking Research and Practice to Improve Learning, 2025
Cybersecurity is rarely taught in formal elementary education due to the lack of standards and existing curricula. To address this gap, we developed a cybersecurity and cryptology curriculum for informal learning environments, accompanied by an asynchronous Online Professional Development (OPD) program. This study examines the design strategies of…
Descriptors: Asynchronous Communication, Computer Mediated Communication, Faculty Development, Elementary Education
Shaobin Chen; Qingrong Li; Tao Wang – International Journal of Information and Communication Technology Education, 2024
This study aims to assess the implementation of smart campus and the students' learning engagement at Zhongshan College, China. A well-structured questionnaire was developed, and information was collected from 277 students and 377 teachers. The results indicate that both groups of respondents highly agree on the construction levels of the smart…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Learner Engagement
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Improving Belonging and Connectedness in the Cybersecurity Workforce: From College to the Profession
Mary Beth Klinger – Journal of Cybersecurity Education, Research and Practice, 2024
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students' sense of belonging and connectedness in the…
Descriptors: Computer Security, Sense of Community, Associate Degrees, Community College Students
Harris, Mark A.; Patten, Karen P. – Journal of Information Systems Education, 2015
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Descriptors: Taxonomy, Computer Security, Curriculum Development, Undergraduate Study
McNulty, John; Chandrasekhar, Arcot; Hoyt, Amy; Gruener, Gregory; Espiritu, Baltazar; Price, Ron, Jr. – Journal of Educational Computing Research, 2011
This report summarizes more than a decade of experiences with implementing computer-based testing across a 4-year medical curriculum. Practical considerations are given to the fields incorporated within an item database and their use in the creation and analysis of examinations, security issues in the delivery and integrity of examinations,…
Descriptors: Educational Research, Testing, Integrity, Computer Assisted Testing
Tabor, Sharon W. – Quarterly Review of Distance Education, 2007
Distance education has become an expectation with students who have grown up with technology as well as nontraditional and working students. Most universities now offer a wide range of online courses and degree programs to meet these needs. Online delivery of technology courses, however, has been problematic when the course includes very complex…
Descriptors: Distance Education, Online Courses, Computer Security, Information Science Education

Peer reviewed
Direct link
