NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 23 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Minjuan; Yu, Haiyang; Bell, Zerla; Chu, Xiaoyan – IEEE Transactions on Learning Technologies, 2022
The Metaverse is a network of 3-D virtual worlds supporting social connections among its users and enabling them to participate in activities mimicking real life. It merges physical and virtual reality and provides channels for multisensory interactions and immersions in a variety of environments (Mystakidis, 2022). The Metaverse is considered the…
Descriptors: Technology Uses in Education, Computer Simulation, Educational Environment, Best Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Workman, Michael D. – Journal of Cybersecurity Education, Research and Practice, 2021
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of…
Descriptors: Computer Security, Information Security, Computer Science Education, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Sungkur, Roopesh Kevin; Maharaj, Manoj S. – Education and Information Technologies, 2021
Teaching and Learning confined to within the four walls of a classroom or even online Learning through Massive Online Courses (MOOCs) and other Learning Content Management Systems (LCMS) are no longer seen as the optimal approach for competency and skills development, especially for working professionals. Each of these busy learners have their own…
Descriptors: Foreign Countries, Electronic Learning, Educational Environment, Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Liew, Tze Wei; Pang, Wei Ming; Leow, Meng Chew; Tan, Su-Mae – Smart Learning Environments, 2022
Emotional design refers to imbuing a multimedia learning environment with design attributes that promote learners' positive affect and motivation to enhance learning. One such feature is anthropomorphism, in which human-like attributes are infused into learning elements in a multimedia learning environment. This study examines the affective,…
Descriptors: Multimedia Instruction, Instructional Design, Multimedia Materials, Human Body
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Peer reviewed Peer reviewed
Direct linkDirect link
Cifuentes, Laurent; Mercer, Rene; Alverez, Omar; Bettati, Riccardo – TechTrends: Linking Research and Practice to Improve Learning, 2010
We report on the design, development, implementation, and evaluation of a case-based instructional environment designed for learning network engineering skills for cybersecurity. We describe the societal problem addressed, the theory-based solution, and the preliminary testing and evaluation of that solution. We identify an architecture for…
Descriptors: Case Method (Teaching Technique), Problem Solving, Scaffolding (Teaching Technique), Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Previous Page | Next Page »
Pages: 1  |  2