NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Research10
Journal Articles6
Information Analyses1
Tests/Questionnaires1
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Desmet, Ophélie A.; Crimmins, Danielle M.; Flewellen, Gerniya; Seigfried-Spellar, Kathryn C. – Gifted Child Today, 2023
The purpose of the present study was to evaluate a cybersecurity and digital forensics enrichment program for gifted and talented students to determine students' perceptions of this enrichment course. We evaluated data from 25 secondary education students and one educator to examine their perceptions of the program. Responses from students and the…
Descriptors: Academically Gifted, Secondary School Students, Student Attitudes, Program Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Lisa M. Jones; Kimberly J. Mitchell; Cheryl L. Beseler – Contemporary School Psychology, 2024
School psychologists and other school professionals are increasingly turning to digital citizenship programs to improve children's online safety. However, to date, there has been no rigorous outcome evaluation of these programs. The current study used a cluster randomized control trial methodology (CRCT) to evaluate the impact of the Be Internet…
Descriptors: Elementary School Students, Computer Security, Bullying, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Kool, Wouter; van der Werf, Titia; Lavoie, Brian – OCLC Online Computer Library Center, Inc., 2014
The Preservation Health Check (PHC) project, undertaken as a joint effort by Open Planets Foundation (OPF) and OCLC Research, aims to evaluate the usefulness of the preservation metadata created and maintained by operational repositories for assessing basic preservation properties. The PHC project seeks to develop an implementable logic to support…
Descriptors: Information Storage, Metadata, Information Management, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond – Education and Information Technologies, 2015
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Descriptors: Foreign Countries, Crime, Computer Security, Crime Prevention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Jianjun – Grantee Submission, 2014
"Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…
Descriptors: Information Technology, Computer Networks, Curriculum Development, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Nyagowa, Hesbon O.; Ocholla, Dennis N.; Mutula, Stephen M. – Education for Information, 2013
This study was conducted to determine the effect of a set of dimensions on e-School success in a cross-sectional study of NEPAD's e-School pilot in Kenya. All of the six e-Schools participating in the NEPAD's e-School pilot in Kenya were selected. The study used survey methodology. Students and teachers in those schools formed the study…
Descriptors: Computer Security, Foreign Countries, User Satisfaction (Information), Pilot Projects