Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 18 |
Since 2016 (last 10 years) | 33 |
Since 2006 (last 20 years) | 70 |
Descriptor
Source
Author
Wodarz, Nan | 3 |
Botterman, Maarten | 2 |
Cremonini, Leon | 2 |
Ettedgui, Emile | 2 |
Graafland-Essers, Irma | 2 |
Hope, Andrew | 2 |
Woollard, John | 2 |
Abdollah, Faizal Mohd | 1 |
Adriane B. Randolph | 1 |
Ahmed, Nafis | 1 |
Akcay, Behiye | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 39 |
Postsecondary Education | 32 |
Elementary Secondary Education | 9 |
Adult Education | 5 |
Elementary Education | 4 |
Two Year Colleges | 2 |
Early Childhood Education | 1 |
Grade 12 | 1 |
Grade 2 | 1 |
Grade 3 | 1 |
Grade 4 | 1 |
More ▼ |
Location
United Kingdom | 6 |
United States | 6 |
Canada | 3 |
Europe | 2 |
Greece | 2 |
Idaho | 2 |
Maryland | 2 |
Pennsylvania | 2 |
Switzerland | 2 |
Australia | 1 |
Bangladesh | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Coronavirus Aid Relief and… | 1 |
Elementary and Secondary… | 1 |
United Nations Convention on… | 1 |
Universal Declaration of… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
OConnor, T. J.; Brown, Dane; Jackson, Jasmine; Payne, Bryson; Schmeelk, Suzanna – Journal of Cybersecurity Education, Research and Practice, 2023
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to…
Descriptors: Computer Security, Computer Science Education, Gamification, Competition
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Chen, Hao; Zhang, Yan; Zhang, Song; Lyu, Tu – Education and Information Technologies, 2023
This study examines the effect of a gamified information security education system (ISES) on developing users' information security awareness and protection behavioral intention. We developed a research model based on affordance theory and means-end chain theory. Using a scenario-based experimental survey approach, we obtained 220 valid samples…
Descriptors: Intention, Information Security, Computer Security, Correlation
Md Alimul Haque; Shameemul Haque; Sana Zeba; Kailash Kumar; Sultan Ahmad; Moidur Rahman; Senapathy Marisennayya; Laiq Ahmed – E-Learning and Digital Media, 2024
E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinence in the distance education system. Due to COVID-19, the online learning education system has become very popular. Most probably, all education systems have been using the IoT-based E-Learning system to continue the students' education without…
Descriptors: Electronic Learning, Internet, Information Networks, Technology Uses in Education
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security
Saah Agyemang-Badu; Felisa Tibbitts; Sage Phillips – Current Issues in Comparative Education, 2024
The treatment of artificial intelligence (AI) in the field of education has so far been typically characterized by (a) information about how AI can assist educators in carrying out their work, and (b) concerns about the misuse of AI by learners, for example, concerning plagiarism. The links between AI and ethics within the field of education are…
Descriptors: Artificial Intelligence, Elementary Secondary Education, Higher Education, Ethics
Humayun Zafar; Carole L. Hollingsworth; Tridib Bandyopadhyay; Adriane B. Randolph – Journal of Cybersecurity Education, Research and Practice, 2024
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus on efforts in the Southeast region of the United States. The discussion features insights from a panel consisting of an academic cybersecurity…
Descriptors: Computer Security, Career Pathways, Computer Science Education, Industry
Vekaria, Komal Bhupendra; Calyam, Prasad; Wang, Songjie; Payyavula, Ramya; Rockey, Matthew; Ahmed, Nafis – IEEE Transactions on Learning Technologies, 2021
There is an increasing trend in cloud adoption of enterprise applications in, for example, manufacturing, healthcare, and finance. Such applications are routinely subject to targeted cyberattacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to…
Descriptors: Computer Security, Training, Crime Prevention, Information Technology
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Wang, Minjuan; Yu, Haiyang; Bell, Zerla; Chu, Xiaoyan – IEEE Transactions on Learning Technologies, 2022
The Metaverse is a network of 3-D virtual worlds supporting social connections among its users and enabling them to participate in activities mimicking real life. It merges physical and virtual reality and provides channels for multisensory interactions and immersions in a variety of environments (Mystakidis, 2022). The Metaverse is considered the…
Descriptors: Technology Uses in Education, Computer Simulation, Educational Environment, Best Practices
Belessova, Damira; Ibashova, Almira; Bosova, Lyudmila; Shaimerdenova, Guldana – Open Education Studies, 2023
The article is an analysis of the current topic -- digitalization of the educational process. In the course of collecting and interpreting the known data, the authors cite the pedagogical foundations of digital literacy, the current state of digital learning and problems, and the prospects for the development of this direction in the future are…
Descriptors: Digital Literacy, Electronic Learning, Ecology, Educational Trends
Lam, Tsz Yiu; Dongol, Brijesh – Interactive Learning Environments, 2022
The properties of a blockchain such as immutability, provenance, and peer-executed smart contracts could bring a new level of security, trust, and transparency to e-learning. In this paper, we introduce our proof-of-concept blockchain-based e-learning platform developed to increase transparency in assessments and facilitate curriculum…
Descriptors: Information Technology, Web Based Instruction, Instructional Innovation, Electronic Learning
Greenhalgh-Spencer, Heather – Educational Theory, 2019
In this article, Heather Greenhalgh-Spencer analyzes three examples of curricula aimed at cultivating good cyber behavior and countering online harassment. These curricula are branded as addressing civic needs, cultivating civic duty, and developing skills to help students understand and react to online threats. Here, Greenhalgh-Spencer offers two…
Descriptors: Computer Security, Safety, Bullying, Computer Mediated Communication