NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers3
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 23 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Thulasi M. Santhi; K. Srinivasan – IEEE Transactions on Learning Technologies, 2024
Cloud adoption in industrial sectors, such as process, manufacturing, health care, and finance, is steadily rising, but as it grows, the risk of targeted cyberattacks has increased. Hence, effectively defending against such attacks necessitates skilled cybersecurity professionals. Traditional human-based cyber-physical education is resource…
Descriptors: Artificial Intelligence, Information Security, Computer Security, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Saglam, Rahime Belen; Miller, Vincent; Franqueira, Virginia N. L. – IEEE Transactions on Education, 2023
Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. Research Questions: 1. What cyber security…
Descriptors: Computer Science Education, Computer Security, Children, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thitima Srivatanakul – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification, including game-based learning (GBL), is a widely recognized pedagogical approach used for imparting and reinforcing cybersecurity knowledge and skills to learners. One innovative form of GBL gaining popularity across various educational levels, from secondary schools to professional development, is escape room-style education. This…
Descriptors: Computer Security, Problem Solving, Gamification, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Workman, Michael D.; Luevanos, J. Anthony; Mai, Bin – IEEE Transactions on Education, 2022
Contribution: Based on a previous exploratory study, this research further investigated learning mode contributions from simulations and live competitive activities compared to a traditional classroom, laboratory, and testing approach to instruction in order to assess the applied behavioral contributions of each. Background: Cybersecurity…
Descriptors: Computer Security, Information Security, Computer Science Education, Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Saleh, Mohamad – Journal of Instructional Research, 2020
Having a clear teaching strategy is vital when it comes to improving students' retention and preserving their knowledge. Various general teaching approaches have been incorporated into the classrooms as ways of improving teaching and student learning. Some of these approaches proved to be effective and some are ineffective. In this study, I…
Descriptors: Teaching Methods, Computer Security, Instructional Effectiveness, STEM Education
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Nweke, Livinus Obiora; Bokolo, Anthony Jnr; Mba, Gibson; Nwigwe, Emeka – Education and Information Technologies, 2022
HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the HyFlex pedagogical method to teach highly interactive digital and face-to-face cyber security training in Nigeria amidst the…
Descriptors: Computer Security, Information Security, Videoconferencing, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Workman, Michael D. – Journal of Cybersecurity Education, Research and Practice, 2021
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of…
Descriptors: Computer Security, Information Security, Computer Science Education, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Michael Adorjan; Rosemary Ricciardelli; Mohana Mukherjee – British Journal of Educational Studies, 2024
Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative…
Descriptors: Computer Security, Restorative Practices, Bullying, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification
Peer reviewed Peer reviewed
Direct linkDirect link
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Previous Page | Next Page »
Pages: 1  |  2