Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Information Systems Education… | 2 |
Informatics in Education | 1 |
Interactive Learning… | 1 |
Journal of Cybersecurity… | 1 |
Author
Biros, David | 1 |
Blair Taylor | 1 |
Evmorfia-Iro Bartzia | 1 |
James G. Ward | 1 |
Jeff Hanson | 1 |
Kim, Sang Soo | 1 |
Li-Jen Lester | 1 |
Marco Sbaraglia | 1 |
Michael Lodi | 1 |
Siddharth Kaza | 1 |
Sikolia, David | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 5 |
Tests/Questionnaires | 5 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
Europe | 1 |
South Korea | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Kim, Sang Soo – Interactive Learning Environments, 2023
As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary to explore the motivators and barriers to student engagement comprehensively. Given the nature of an online learning environment, this study specifically focused on security…
Descriptors: Online Courses, Universities, COVID-19, Pandemics
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods