Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 9 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Journal of Cybersecurity… | 4 |
Information Systems Education… | 3 |
ACM Transactions on Computing… | 1 |
International Education… | 1 |
Journal of STEM Education:… | 1 |
ProQuest LLC | 1 |
Author
Abu-Taieh, Evon M. | 1 |
Alluhaidan, Ala | 1 |
Barrett, Diane | 1 |
Blair Taylor | 1 |
Cherrise Ficke | 1 |
Cheryl Beauchamp | 1 |
Cook, Kristin | 1 |
Evans, Gerald | 1 |
Fan, Yibo | 1 |
Firth, David | 1 |
Fulton, Eric | 1 |
More ▼ |
Publication Type
Tests/Questionnaires | 11 |
Journal Articles | 10 |
Reports - Research | 10 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Raj Kumar Dhungana; Lina Gurung; Hem Poudyal – Journal of Cybersecurity Education, Research and Practice, 2023
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with…
Descriptors: Computer Security, Age Groups, Foreign Countries, Knowledge Level
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Barrett, Diane – Information Systems Education Journal, 2020
In a cloud computing environment, traditional digital forensic processes (such as turning off the computer to image the computer hard drive) can be disruptive to businesses because the data of businesses may be co-mingled with other content. As technology changes, the way digital forensics acquisitions are conducted are also changing. The change…
Descriptors: Computer Science Education, Crime, Evidence, Computer Security
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Jakob E. Barnard – ProQuest LLC, 2022
This project examined the adoption of cybersecurity into computing programs within liberal arts programs and whether the rate constitutes an innovative program. The research questions focused on the lived experience existing faculty members have had with the cybersecurity curriculum within liberal arts computing programs. Liberal arts general…
Descriptors: Hermeneutics, Phenomenology, Computer Security, Computer Science Education
Alluhaidan, Ala; Abu-Taieh, Evon M. – International Education Studies, 2020
Abstract The rapid growth of technology and related fields has led to creation in academia to match the expansion demand for IT professionals. One of the current majors that attract attention in industry is cybersecurity. There is a great need for individuals who are skilled in cybersecurity to protect IT infrastructure. Coaching a…
Descriptors: Outcomes of Education, Computer Security, Information Technology, Computer Science Education
Thomas, Kevin M.; Ivy, Jessica; Cook, Kristin; Kelley, Robert R. – Journal of Cybersecurity Education, Research and Practice, 2022
The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers' technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Security, Computer Security
Yang, Dazhi; Xu, Dianxiang; Yeh, Jyh-haw; Fan, Yibo – Journal of STEM Education: Innovations and Research, 2019
Undergraduate research opportunities have expanded from elite universities in the United States to universities and institutions of all ranks and sizes. Research studies have shown positive outcomes in regards to the research experience for undergraduates (REU), such as enhanced research skills and competencies. However, with the widespread…
Descriptors: Undergraduate Students, Student Research, Computer Security, Information Security
Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David – Information Systems Education Journal, 2014
This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…
Descriptors: Case Studies, Information Security, Computer Security, Class Activities
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education