Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Training | 3 |
Internet | 2 |
Child Behavior | 1 |
Child Safety | 1 |
Computer Assisted Instruction | 1 |
Computer Science Education | 1 |
Crime Prevention | 1 |
Critical Thinking | 1 |
Data Use | 1 |
Educational Technology | 1 |
More ▼ |
Source
IEEE Transactions on Learning… | 3 |
Author
Ahmed, Nafis | 1 |
Calyam, Prasad | 1 |
Celeda, Pavel | 1 |
Hui Li | 1 |
Payyavula, Ramya | 1 |
Rockey, Matthew | 1 |
Seda, Pavel | 1 |
Svabensky, Valdemar | 1 |
Vekaria, Komal Bhupendra | 1 |
Vykopal, Jan | 1 |
Wang, Songjie | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Elementary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Vekaria, Komal Bhupendra; Calyam, Prasad; Wang, Songjie; Payyavula, Ramya; Rockey, Matthew; Ahmed, Nafis – IEEE Transactions on Learning Technologies, 2021
There is an increasing trend in cloud adoption of enterprise applications in, for example, manufacturing, healthcare, and finance. Such applications are routinely subject to targeted cyberattacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to…
Descriptors: Computer Security, Training, Crime Prevention, Information Technology