Publication Date
| In 2026 | 1 |
| Since 2025 | 54 |
| Since 2022 (last 5 years) | 220 |
| Since 2017 (last 10 years) | 350 |
| Since 2007 (last 20 years) | 445 |
Descriptor
Source
Author
| Payne, Brian K. | 5 |
| Jenay Robert | 4 |
| Martin, Florence | 4 |
| Christine Wusylko | 3 |
| Frydenberg, Mark | 3 |
| Jamie Reeves | 3 |
| Jones, Keith S. | 3 |
| Mark McCormack | 3 |
| Marquardson, Jim | 3 |
| Nichole Arbino | 3 |
| Nicole Muscanell | 3 |
| More ▼ | |
Publication Type
Education Level
Location
| Turkey | 22 |
| United Kingdom | 14 |
| Australia | 11 |
| India | 11 |
| Spain | 11 |
| Canada | 9 |
| United States | 9 |
| Texas | 8 |
| China | 7 |
| Malaysia | 7 |
| Saudi Arabia | 7 |
| More ▼ | |
Laws, Policies, & Programs
| Equal Access | 2 |
| Family Educational Rights and… | 2 |
| G I Bill | 1 |
| United Nations Convention on… | 1 |
Assessments and Surveys
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Program for International… | 1 |
What Works Clearinghouse Rating
Kaur, Kanwalinderjit – Journal of Cybersecurity Education, Research and Practice, 2023
Embedding a pairwise key distribution approach in IoT systems is challenging as IoT devices have limited resources, such as memory, processing power, and battery life. This paper presents a secure and lightweight approach that is applied to IoT devices that are divided into Voronoi clusters. This proposed algorithm comprises XOR and concatenation…
Descriptors: Internet, Computer Security, Algorithms, Equipment
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Mahao Mahao; Julia Chere-Masopha – Discourse and Communication for Sustainable Education, 2025
Digital literacy has become crucial for functionality and productivity in academics, work, and everyday community lives. However, easy access to digital technologies, accompanied by limited digital literacy, can expose users to the dangers that lurk in the digital world. Young people, who are frequent users of these technologies yet have less…
Descriptors: Student Teachers, Student Attitudes, Computer Security, Foreign Countries
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Oumaima Ouadoud; Tarik Chafiq; Ahmed Eddaoui – Educational Process: International Journal, 2025
Background/purpose. This research was conducted to address the growing need for more secure, transparent, and efficient solutions for the issuance and management of university degrees. The main purpose of the study is to evaluate which Blockchains are best suited for this application, aiming to enhance the reliability and speed of degree-related…
Descriptors: Academic Degrees, Technology Uses in Education, Computer Security, Academic Records
Dariusz Witko; Yair Levy; Catherine Neubauer; Gregory Simco; Laurie P. Dringus; Melissa Carlton – Journal of Cybersecurity Education, Research and Practice, 2025
The increasing volume of cyber threats, combined with a critical shortage of skilled professionals and rising burnout among practitioners, highlights the urgent need for innovative solutions in cybersecurity operations. Generative Artificial Intelligence (GenAI) offers promising potential to augment human analysts in cybersecurity, but its…
Descriptors: Computer Security, Competence, Artificial Intelligence, Expertise
Raymond Patt; Sotheara Veng; Lien Vu; Chrystalla Mouza; Yan-Ming Chiou; Chien-Chung Shen – Journal of Interactive Learning Research, 2025
Children are increasingly exposed to malicious actors online that could cause digital or even physical harm. Research shows that children know little about cybersecurity, but national organizations are emphasizing cybersecurity education. Practitioners have taught cybersecurity in many ways; however, none have utilized social robots to engage…
Descriptors: Robotics, Elementary School Students, Student Attitudes, Information Security
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Human Aspects of Cyber Security for Computing Higher Education: Current Status and Future Directions
Kaie Maennel; Olaf Maennel – ACM Transactions on Computing Education, 2025
The human aspects of cyber security are fundamental as these are interlinked with processes and technology in building resilience against an evolving and complex threat landscape. It is vital to teach future cyber security specialists sufficient knowledge about human aspects in order to strengthen the defences and defend against malicious actors.…
Descriptors: Computer Security, Computer Science Education, College Curriculum, Teaching Methods
Tang Wee Teo; Sherwin John San Buenaventura Mabulo; Kim Chwee Daniel Tan; Jin Xin Matilda Ho; Xue Xian Thea Tan – Journal of Science Education and Technology, 2025
STEM (science, technology, engineering, mathematics) hackathons have been conducted to offer opportunities for diverse participants to work collaboratively and intensely on tasks within a short period. However, most literature about hackathons does not offer theoretical discussions on the affordances of such learning contexts for school students.…
Descriptors: Epistemology, STEM Education, Computer Security, Programming
Hajar Rashid AlKalbani; Kamla Ali Al-Busaidi – Education and Information Technologies, 2025
This study aims to develop an integrated framework for the security of e-learning systems. As a main knowledge management system (KMS) in higher education institutions, the security of the e-learning system is critical. The literature indicated that inadequate security measures make it difficult for e-learning systems to fend off cyberattacks.…
Descriptors: Foreign Countries, Higher Education, Information Technology, Electronic Learning
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Christine Wusylko; Kara Dawson; Zhen Xu; Pavlo Antonenko; DoHyong Koh – Journal of Science Education and Technology, 2025
Online professional development (OPD) is a popular professional learning option, especially for those with monetary and time constraints such as afterschool educators. This study reports on the design, implementation, and evaluation of an OPD on preparing 18 afterschool educators to teach a content-heavy, transmedia, STEM curriculum on cryptology…
Descriptors: Online Courses, Faculty Development, After School Programs, STEM Education
Damjan Fujs; Simon Vrhovec; Tomaž Hovelja; Damjan Vavpotic – Education and Information Technologies, 2025
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the…
Descriptors: Foreign Countries, Older Adults, Digital Literacy, Computer Literacy

Peer reviewed
Direct link
