NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, Sang Soo – Interactive Learning Environments, 2023
As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary to explore the motivators and barriers to student engagement comprehensively. Given the nature of an online learning environment, this study specifically focused on security…
Descriptors: Online Courses, Universities, COVID-19, Pandemics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods