NotesFAQContact Us
Collection
Advanced
Search Tips
Source
Journal of Cybersecurity…32
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 32 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Daniel T. Hickey; Ronald J. Kantor – Journal of Cybersecurity Education, Research and Practice, 2024
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the "transfer" of cybersecurity learning is crucial. We compared how different recognized "cognitive" transfer theories might help explain and synergize three aspects of cybersecurity education. These include "teaching and…
Descriptors: Transfer of Training, Computer Science Education, Computer Security, Metacognition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
OConnor, T. J.; Brown, Dane; Jackson, Jasmine; Payne, Bryson; Schmeelk, Suzanna – Journal of Cybersecurity Education, Research and Practice, 2023
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to…
Descriptors: Computer Security, Computer Science Education, Gamification, Competition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Raj Kumar Dhungana; Lina Gurung; Hem Poudyal – Journal of Cybersecurity Education, Research and Practice, 2023
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with…
Descriptors: Computer Security, Age Groups, Foreign Countries, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ryan Straight – Journal of Cybersecurity Education, Research and Practice, 2024
This study applies a posthuman lens to the National Initiative for Cybersecurity Education (NICE) Workforce Framework, examining two key Work Roles in cybersecurity education. Employing a novel posthuman coding scheme, the associated Tasks, Knowledge, and Skills (TKS) statements were analyzed. Findings reveal significant posthuman elements within…
Descriptors: Computer Security, Computer Science Education, Job Skills, Ability
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gary A. Harris – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist in the United States and globally and are well documented in literature. This study examined what state universities are doing to help address the…
Descriptors: State Universities, Computer Security, Professional Personnel, Labor Supply
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Humayun Zafar; Carole L. Hollingsworth; Tridib Bandyopadhyay; Adriane B. Randolph – Journal of Cybersecurity Education, Research and Practice, 2024
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus on efforts in the Southeast region of the United States. The discussion features insights from a panel consisting of an academic cybersecurity…
Descriptors: Computer Security, Career Pathways, Computer Science Education, Industry
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bowen, Debra; Jaurez, James; Jones, Nancy; Reid, William; Simpson, Christopher – Journal of Cybersecurity Education, Research and Practice, 2022
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational…
Descriptors: Computer Security, Information Security, Educational Resources, Elementary Secondary Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paul Wagner; Dalal Alharthi – Journal of Cybersecurity Education, Research and Practice, 2024
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that…
Descriptors: Artificial Intelligence, Computer Simulation, Information Technology, Computer Security
Previous Page | Next Page ยป
Pages: 1  |  2  |  3