NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Journal Articles20
Reports - Research20
Tests/Questionnaires2
Information Analyses1
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kate Quintana; Caroline Sutton Chubb; Daniel Olson; Anna E. Kosloski – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has become increasingly important not only in the technology sector but in criminal justice professions as well, and significant challenges have arisen as a result. However, these challenges are not well discussed in the literature. To address this gap, and to study the cybersecurity trends impacting criminal justice professionals…
Descriptors: Computer Security, Knowledge Level, Criminal Law, Role Theory
Peer reviewed Peer reviewed
Direct linkDirect link
Desmet, Ophélie A.; Crimmins, Danielle M.; Flewellen, Gerniya; Seigfried-Spellar, Kathryn C. – Gifted Child Today, 2023
The purpose of the present study was to evaluate a cybersecurity and digital forensics enrichment program for gifted and talented students to determine students' perceptions of this enrichment course. We evaluated data from 25 secondary education students and one educator to examine their perceptions of the program. Responses from students and the…
Descriptors: Academically Gifted, Secondary School Students, Student Attitudes, Program Evaluation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Peer reviewed Peer reviewed
Direct linkDirect link
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ibrahim, Ahmed; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2021
DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for…
Descriptors: Information Security, Computer Security, Educational Resources, Active Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Luse, Andy; Burkman, Jim – Journal of Cybersecurity Education, Research and Practice, 2021
Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner,…
Descriptors: Computer Security, Information Security, Deception, Student Projects
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kellie Johnson; Tiffany Drape; Joseph Oakes; Joseph Simpson; Anne M. Brown; Donna Westfall-Rudd – Journal of Cybersecurity Education, Research and Practice, 2024
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the 'hidden curriculum' of seeking internships and jobs. Exposing students through…
Descriptors: Agriculture, Biological Sciences, Curriculum, Biological Influences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Essig, Rebecca R.; Elahi, Behim; Hunter, Jennifer L.; Mohammadpour, Atefeh; O'Connor, Kimberly W. – Journal of STEM Outreach, 2020
"Future Girls of STEM" is a university-sponsored, summer camp outreach program that was designed and implemented by an all-female faculty group to increase young girls' interest in pursuing future careers in science, technology, engineering, and mathematics (STEM). This paper discusses the logistics and results of the pilot Future Girls…
Descriptors: Females, Camps, STEM Education, Engineering
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Payne, Brian K.; Mayes, Lisa; Paredes, Tisha; Smith, Elizabeth; Wu, Hongyi; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university's undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and…
Descriptors: Interdisciplinary Approach, Information Security, Computer Security, Information Science Education
Previous Page | Next Page »
Pages: 1  |  2