Publication Date
In 2025 | 5 |
Since 2024 | 14 |
Since 2021 (last 5 years) | 40 |
Since 2016 (last 10 years) | 62 |
Since 2006 (last 20 years) | 75 |
Descriptor
Source
Author
Cummings, Jeff | 2 |
Daniel L. Segal | 2 |
David Kocsis | 2 |
Frydenberg, Mark | 2 |
Ibrahim, Walid | 2 |
Janicki, Thomas | 2 |
Lawler, James P. | 2 |
Lawrence, Cameron | 2 |
Morgan Shepherd | 2 |
Trabelsi, Zouheir | 2 |
Workman, Michael D. | 2 |
More ▼ |
Publication Type
Reports - Research | 75 |
Journal Articles | 70 |
Tests/Questionnaires | 8 |
Speeches/Meeting Papers | 4 |
Information Analyses | 3 |
Education Level
Audience
Teachers | 1 |
Location
Turkey | 3 |
United Kingdom | 3 |
Texas | 2 |
California | 1 |
Cambodia | 1 |
Cameroon | 1 |
Colorado (Colorado Springs) | 1 |
Czech Republic | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Birgy Lorenz – Educational Media International, 2023
The proportion of women in the IT sector is decreasing. In schools, girls tend to stay away from IT or take on roles in softer activities such as digital safety, social media. Studying and working in IT requires technical skillset. At the same time, the sector would need people with people and organizational skills as well. Technical skills can be…
Descriptors: Females, Role Models, Information Technology, Foreign Countries
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Ondrušková, Dana; Pospíšil, Richard – Contemporary Educational Technology, 2023
The increasing use of the Internet calls upon the need for adequate cyber security awareness to better face the risk and dangers connected with the online environment. This research presents an experiment that revealed the cyber security awareness of children at Czech primary schools. They were tested for their skills to distinguish different…
Descriptors: Best Practices, Curriculum Implementation, Information Security, Elementary School Students
Weitl-Harms, Sherri; Spanier, Adam; Hastings, John; Rokusek, Matthew – Journal of Cybersecurity Education, Research and Practice, 2023
Gamification in education presents a number of benefits that can theoretically facilitate higher engagement and motivation among students when learning complex, technical concepts. As an innovative, high-potential educational tool, many educators and researchers are attempting to implement more effective gamification into undergraduate coursework.…
Descriptors: Gamification, Undergraduate Students, Information Security, Game Based Learning
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Kraus, Lydia – Education and Information Technologies, 2022
Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating…
Descriptors: Data Use, Learning Analytics, Information Security, Training
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Embracing Artificial Intelligence to Improve Self-Directed Learning: A Cybersecurity Classroom Study
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Workman, Michael D.; Luevanos, J. Anthony; Mai, Bin – IEEE Transactions on Education, 2022
Contribution: Based on a previous exploratory study, this research further investigated learning mode contributions from simulations and live competitive activities compared to a traditional classroom, laboratory, and testing approach to instruction in order to assess the applied behavioral contributions of each. Background: Cybersecurity…
Descriptors: Computer Security, Information Security, Computer Science Education, Simulation
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Tarhan, Gülseren; Öztürk, Gülcan – International Journal of Contemporary Educational Research, 2022
This study aims to determine the impact of flipped learning and gamification methods on student achievement in the subject of ethics and security, which is a topic of the fifth grade information technology and software course, compared to the traditional method. Also, it aims to decide the students' opinion of about the flipped learning and…
Descriptors: Flipped Classroom, Game Based Learning, Computer Science Education, Academic Achievement
Bocharov, Mikhail I.; Simonova, Irina V.; Bocharov?, Tatyana I.; Zaika, Anna Y. – International Association for Development of the Information Society, 2020
The analysis of the results of scientific research has revealed the necessity to track the level of anxiety of a student while studying aspects of information security in a particular subject area. And in accordance with the results, it was necessary to justify the choice of methods for management and content of information security training in…
Descriptors: Information Security, Computer Science Education, Anxiety, Middle School Students
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Borka Jerman Blažic; Andrej Jerman Blažic – International Society for Technology, Education, and Science, 2024
Based on an exhaustive study from 2001-2003 involving 14 high schools in the EU, a definition of the educational content and the aligned methodology for high school levels was developed for two areas--cyber safety and cybersecurity--with the aim of improving the knowledge and skills of students and their teachers. Available sources, including…
Descriptors: Teaching Methods, Computer Science Education, Information Security, Computer Security