Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Industry and Higher Education | 1 |
Journal of Cybersecurity… | 1 |
Journal of Educational Data… | 1 |
Journal of Learning and… | 1 |
Author
Barkanic, Steve | 1 |
Cardenas-Navia, Isabel | 1 |
Edwards, John | 1 |
Elzey, Karen | 1 |
Fitzgerald, Brian K. | 1 |
Gary A. Harris | 1 |
Hart, Kaden | 1 |
Hughes, Debbie | 1 |
Mehmet Fatih Yigit | 1 |
Shrestha, Raj | 1 |
Troyan, Danielle | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Gary A. Harris – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist in the United States and globally and are well documented in literature. This study examined what state universities are doing to help address the…
Descriptors: State Universities, Computer Security, Professional Personnel, Labor Supply
Mehmet Fatih Yigit – Journal of Learning and Teaching in Digital Age, 2025
Technology, while enhancing efficiency and effectiveness, also poses significant cyber threats and risks. Overcoming these challenges necessitates individuals to have high levels of cybersecurity awareness and to exhibit proper cybersecurity behaviors. Correspondingly, in recent years, the exploration of individual factors influencing…
Descriptors: Metacognition, Computer Security, Information Security, Student Behavior
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Troyan, Danielle – Industry and Higher Education, 2015
BHEF has achieved particular success in operationalizing its National Higher Education and Workforce Initiative (HEWI) in Maryland focusing on cybersecurity. Leveraging its membership of corporate CEOs, university presidents and government agency leaders, BHEF partnered with the University System of Maryland to build a system-wide response to the…
Descriptors: Higher Education, Labor Force Development, Internet, Computer Security