Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
Source
| Journal of Cybersecurity… | 2 |
Author
| Maureen Namukasa | 2 |
| Meredith Carroll | 2 |
| Bhoomin B. Chauhan | 1 |
| Carlie Swords | 1 |
| Catherine Diresta | 1 |
| Cherrise Ficke | 1 |
| Curtice Gough | 1 |
| Isabella Piasecki | 1 |
| John Vitali | 1 |
| Maria Chaparro Osman | 1 |
| T. J. O'Connor | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
| Tests/Questionnaires | 1 |
Education Level
| High Schools | 1 |
| Higher Education | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Florida | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Maureen Namukasa; Bhoomin B. Chauhan; Carlie Swords; Curtice Gough; Weronika Dymanus; Catherine Diresta; John Vitali; Vivek Sharma; T. J. OConnor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2025
This study aimed to evaluate the effectiveness of an eight-module Cybersecurity course at increasing the learning outcomes of middle and high school students with little to no experience in Computer Science and Cybersecurity, including underrepresented minorities (URMs) in Cybersecurity. Twice we administered and evaluated the Cybersecurity…
Descriptors: Computer Security, Internet, Instructional Effectiveness, Middle School Students
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation

Peer reviewed
