Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Internet | 5 |
Computer Science Education | 3 |
Computer Networks | 2 |
Computer Uses in Education | 2 |
Cooperative Learning | 2 |
Engineering Education | 2 |
Student Surveys | 2 |
Teaching Methods | 2 |
Cheating | 1 |
Children | 1 |
More ▼ |
Source
IEEE Transactions on Education | 5 |
Author
Battisti, F. | 1 |
Boato, G. | 1 |
Carli, M. | 1 |
Chaplik, Andrew M. | 1 |
Franqueira, Virginia N. L. | 1 |
Hamman, Seth T. | 1 |
Hopkinson, Kenneth M. | 1 |
Huang, Dijiang | 1 |
Jung, I. Y. | 1 |
Markham, Ruth L. | 1 |
Metzler, Gabrielle E. | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Information Analyses | 1 |
Education Level
Higher Education | 4 |
High Schools | 1 |
Middle Schools | 1 |
Audience
Location
Finland | 1 |
France | 1 |
Italy | 1 |
Romania | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Saglam, Rahime Belen; Miller, Vincent; Franqueira, Virginia N. L. – IEEE Transactions on Education, 2023
Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. Research Questions: 1. What cyber security…
Descriptors: Computer Science Education, Computer Security, Children, Internet
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Jung, I. Y.; Yeom, H. Y. – IEEE Transactions on Education, 2009
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
Descriptors: Virtual Classrooms, Internet, Computer Security, Computer Uses in Education