Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 9 |
Descriptor
Coding | 9 |
Computer Security | 9 |
Computer Science Education | 6 |
Programming | 4 |
Computer Software | 3 |
Programming Languages | 3 |
Data Analysis | 2 |
Foreign Countries | 2 |
Information Security | 2 |
Internet | 2 |
Privacy | 2 |
More ▼ |
Source
Journal of Cybersecurity… | 3 |
E-Learning and Digital Media | 1 |
Education Sciences | 1 |
Interdisciplinary Journal of… | 1 |
International Journal of… | 1 |
International Journal of… | 1 |
Journal of Educational… | 1 |
Author
Banik, Barnali Gupta | 1 |
Borowczak, Mike | 1 |
Boutnaru, Shlomi | 1 |
Buchanan, Rachel | 1 |
Burrows, Andrea C. | 1 |
Chu, Bill | 1 |
Collins, Jazmin | 1 |
Debnath, Diptasree | 1 |
Fernandez, Amanda | 1 |
Ford, Vitaly | 1 |
Ghosh, Emlon | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 9 |
Education Level
High Schools | 2 |
Higher Education | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Postsecondary Education | 1 |
Audience
Location
Australia | 1 |
Israel | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Burrows, Andrea C.; Borowczak, Mike; Mugayitoglu, Bekir – Education Sciences, 2022
Computer science, cybersecurity education, and microcredentials are becoming more pervasive in all levels of the educational system. The purpose of this study was partnering with precollegiate teachers: (1) to investigate the self-efficacy of 30 precollegiate teacher participants towards computer science before, during, and after three iterations…
Descriptors: Computer Science Education, Computer Security, Coding, Partnerships in Education
Debnath, Diptasree; Ghosh, Emlon; Banik, Barnali Gupta – International Journal of Web-Based Learning and Teaching Technologies, 2020
Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation…
Descriptors: Computer Security, Information Security, Privacy, Color
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Yang, Jeong; Lee, Young; Fernandez, Amanda; Sanchez, Joshua – Journal of Cybersecurity Education, Research and Practice, 2020
As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure…
Descriptors: Computer Security, Programming Languages, Programming, Computer Uses in Education
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler – Journal of Educational Computing Research, 2018
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Descriptors: Computer Security, Programming, Coding, Computer Science Education
Buchanan, Rachel; Southgate, Erica; Smith, Shamus P.; Murray, Tiana; Noble, Brittany – E-Learning and Digital Media, 2017
Given that today's children are prolific users of the internet, concern has been raised about the future impact of the digital footprints they are currently generating. Here, we report on the "Best Footprint Forward" project which utilised focus groups to investigate the digital footprint awareness of 33 children (ranging in age from 10…
Descriptors: Internet, Preadolescents, Elementary School Students, Computer Use
Boutnaru, Shlomi; Hershkovitz, Arnon – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2015
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…
Descriptors: Computer Software, Computer Security, Programming Languages, Computer Science Education
McMullan, John L.; Kervin, Melissa – International Journal of Mental Health and Addiction, 2012
This study examines the web design and engineering, advertising and marketing, and pedagogical features present at a random sample of 71 international poker sites obtained from the Casino City directory in the summer of 2009. We coded for 22 variables related to access, appeal, player protection, customer services, on-site security, use of images,…
Descriptors: Addictive Behavior, Familiarity, Advertising, Internet