Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Author
Abasi-amefon O. Affia | 1 |
Alexander Nolte | 1 |
Andrej Jerman Blažic | 1 |
Antonenko, Pavlo | 1 |
Blažic, Borka Jerman | 1 |
Borka Jerman Blažic | 1 |
Choy, Sarojni | 1 |
Clayton, Berwyn | 1 |
Dawson, Kara | 1 |
Dinc, Emre | 1 |
Foltz, C. Bryan | 1 |
More ▼ |
Publication Type
Reports - Research | 10 |
Journal Articles | 8 |
Speeches/Meeting Papers | 2 |
Tests/Questionnaires | 2 |
Information Analyses | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Elementary Education | 2 |
Early Childhood Education | 1 |
Grade 3 | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
High Schools | 1 |
Intermediate Grades | 1 |
Middle Schools | 1 |
Primary Education | 1 |
More ▼ |
Audience
Location
Australia | 1 |
Europe | 1 |
European Union | 1 |
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Borka Jerman Blažic; Andrej Jerman Blažic – International Society for Technology, Education, and Science, 2024
Based on an exhaustive study from 2001-2003 involving 14 high schools in the EU, a definition of the educational content and the aligned methodology for high school levels was developed for two areas--cyber safety and cybersecurity--with the aim of improving the knowledge and skills of students and their teachers. Available sources, including…
Descriptors: Teaching Methods, Computer Science Education, Information Security, Computer Security
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Herr, Trey; Laudrain, Arthur P. B.; Smeets, Max – Journal of Political Science Education, 2021
Colleges and universities continue to expand their curricula to include cybersecurity as an explicit course of study in political science. But what is taught in a course on cybersecurity? Are syllabi deep dives into technology, broad romps through contemporary policy debates, or do they reflect a more varied disposition? Studying the syllabi of an…
Descriptors: Computer Science Education, Computer Security, Information Security, Political Science
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Dinc, Emre – Contemporary Educational Technology, 2019
This study examined the thoughts of preservice teachers about technology integration and collected their ideas about possible barriers to technology integration in education. With this aim, the participants were asked two key questions which are (1) "What does 'Technology Integration in Education' mean to you?" and (2) "What might…
Descriptors: Preservice Teachers, Technology Integration, Educational Technology, Budgets
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Choy, Sarojni; McNickle, Cathy; Clayton, Berwyn – 2001
Since little research existed about services for online learners in Australia, a national study was conducted to explore the expectations and experiences of online learners in the Vocational Education and Training (VET) sector. Online learners enrolled with various Registered Training Organizations (RTOs) from the VET sector were contacted for…
Descriptors: Computer Attitudes, Computer Security, Computer Uses in Education, Course Content