NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive28
Journal Articles27
Tests/Questionnaires2
Speeches/Meeting Papers1
Audience
Teachers6
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 28 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Young, Jacob A.; Farshadkhah, Sahar – Journal of Information Systems Education, 2023
In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their…
Descriptors: Information Security, Class Activities, Computer Science Education, Social Psychology
Peer reviewed Peer reviewed
Direct linkDirect link
Luse, Andy; Shadbad, Forough Nasirpouri – Journal of Information Systems Education, 2023
The demand for qualified analytics professionals remains high with forecasts showing a continued need over the next few years. While this demand necessitates instruction in analytics in the classroom, many students find analytics concepts to be complicated and boring. This teaching brief describes a novel approach to teaching analytics through…
Descriptors: Computer Science Education, Information Security, Learning Activities, Learner Engagement
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bowen, Debra; Jaurez, James; Jones, Nancy; Reid, William; Simpson, Christopher – Journal of Cybersecurity Education, Research and Practice, 2022
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational…
Descriptors: Computer Security, Information Security, Educational Resources, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wanju – TechTrends: Linking Research and Practice to Improve Learning, 2023
A design case is a form of scholarly writing in which the author embarks on a reflective journey sharing rich descriptions of their design, design processes, challenges, etc. This paper presents two design cases that demonstrate how learning theories and instructional design concepts were purposefully incorporated in two instructional applications…
Descriptors: Learning Processes, Instructional Design, Learning Theories, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stoker, Geoff; Clark, Ulku; Vanajakumari, Manoj; Wetherill, William – Information Systems Education Journal, 2021
The United States, along with the rest of the developed world, is experiencing a shortage of cybersecurity talent in the workforce ((ISC)[superscript 2], 2019). Among the strategies being encouraged and used to close this workforce gap are work-based learning programs like cybersecurity apprenticeships. Well-designed apprenticeships can provide a…
Descriptors: Information Security, Computer Science Education, Workplace Learning, Apprenticeships
Jeremy Roschelle; Judi Fusco; Pati Ruiz – Digital Promise, 2024
As Artificial Intelligence within education becomes increasingly important, Digital Promise reviewed the guidance documents released by seven states--California, North Carolina, Ohio, Oregon, Virginia, Washington state, and West Virginia--on how to approach artificial intelligence (AI) in education. Throughout this report the authors summarize the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Employment Qualifications, Responsibility
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tureniyazova, Asiya Ibragimovna – Research in Social Sciences and Technology, 2019
To date, hundreds of advanced teaching methods, such as game methods, have been developed, and these problem-based learning methods are widely used in education. Most of these technologies are based on the principles of student-centered and participatory learning. These interactive methods allow the learner to master the necessary professional…
Descriptors: Teaching Methods, Visual Aids, Information Technology, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Clark, Ulku; Stoker, Geoff; Vetter, Ron – Information Systems Education Journal, 2020
The rising number and cost of cybersecurity attacks justifies continued strong interest in the National Security Agency (NSA) and Department of Homeland Security (DHS) jointly sponsored program for National Centers of Academic Excellence in Cyber Defense (CAE-CD). After briefly outlining the current state of the cybersecurity challenge, this…
Descriptors: Educational Change, Information Security, Public Agencies, National Security
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Previous Page | Next Page »
Pages: 1  |  2