Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 13 |
Since 2006 (last 20 years) | 15 |
Descriptor
Information Security | 15 |
Teaching Methods | 15 |
Computer Security | 11 |
Computer Science Education | 4 |
Correlation | 4 |
Internet | 4 |
Telecommunications | 4 |
Case Studies | 3 |
Computer Software | 3 |
Crime | 3 |
Guidelines | 3 |
More ▼ |
Source
ProQuest LLC | 15 |
Author
Alqarni, Amani | 1 |
Amy Esther Kuiken | 1 |
Brown, Lynn | 1 |
Connor David Nelson | 1 |
Dawn C. Tatum | 1 |
Fleming, Antoine | 1 |
James McGibney | 1 |
Jeremy Jon Bro | 1 |
Johnson, Kenneth T. | 1 |
Laurel Lynn Schneider | 1 |
Lee, Shih-Ting | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 15 |
Education Level
Elementary Education | 3 |
Higher Education | 3 |
Elementary Secondary Education | 2 |
Grade 6 | 2 |
Intermediate Grades | 2 |
Middle Schools | 2 |
Postsecondary Education | 2 |
Early Childhood Education | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
High Schools | 1 |
More ▼ |
Audience
Location
Arizona | 1 |
Texas | 1 |
Texas (Dallas) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jeremy Jon Bro – ProQuest LLC, 2023
Secure Code Education (SCE) is the compliance requirement for many organizations in the U.S. Consequently, many U.S. companies spend large sums on programs and tooling to meet this requirement and to upskill their developers. This tooling is largely underutilized. Classes beyond the bare required minimum are often not taken advantage of, leaving…
Descriptors: Coding, Gamification, Vignettes, Programming
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Amy Esther Kuiken – ProQuest LLC, 2024
The cybersecurity landscape in the United States has rapidly evolved, marked by risk and novel threats (Georgescu, 2021; Siraj et al., 2021). Today, security mindsets are "widely accepted in the computer security community as … essential … for successful cybersecurity practice" (Peterson, 2021, para. 1), valuable to aspiring…
Descriptors: Second Language Learning, Second Language Instruction, Information Security, Computer Security
Brown, Lynn – ProQuest LLC, 2023
Students need academic tools and digital skills for proper social interactions in a digital society. Researchers Ribble and Park (2019) designed the S3 Framework which stresses the importance of developing safe, savvy, and social digital citizens. Using this framework, a series of interventions were developed for students and staff to increase the…
Descriptors: Computer Security, Information Security, Safety, Citizenship
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Yuli Deng – ProQuest LLC, 2021
Personalized learning is gaining popularity in online computer science education due to its characteristics of pacing the learning progress and adapting the instructional approach to each individual learner from a diverse background. Among various instructional methods in computer science education, hands-on labs have unique requirements of…
Descriptors: Individualized Instruction, Experiential Learning, Computer Science Education, Electronic Learning
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
O'Brien, Churairat – ProQuest LLC, 2019
As young children increasingly use the Internet, the children need to learn and apply cybersecurity fundamentals to protect personal data. Teaching young students the basics of strong passwords and data protection in a K-12 classroom setting is an obvious starting point. The literature shows an absence of approved cybersecurity curriculums for use…
Descriptors: Teacher Attitudes, Information Security, Computer Security, Teaching Methods
Fleming, Antoine – ProQuest LLC, 2017
Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…
Descriptors: Information Security, Case Studies, Qualitative Research, Holistic Approach
Rigby, Steven – ProQuest LLC, 2009
A universal problem to our society is the dramatic increase in the number of security threats, risks, and vulnerabilities to our nation's computer systems, data, and infrastructure. Our future success depends upon the problem-solving and thinking abilities of professionals entering the Information Assurance and Security (IAS) field. These…
Descriptors: Information Security, Computer Security, Technology Education, Teaching Methods
Lee, Shih-Ting – ProQuest LLC, 2009
This study examined the relationships between metacognition, self-regulation and students' critical thinking skills and disposition in online Socratic Seminars for ninth grade World Geography and Culture students. Participants of this study came from six intact pre-AP (Pre-Advanced Placement) classes in a public high school in south central Texas…
Descriptors: High School Students, Metacognition, Self Management, Critical Thinking