Publication Date
In 2025 | 5 |
Since 2024 | 32 |
Since 2021 (last 5 years) | 73 |
Since 2016 (last 10 years) | 113 |
Since 2006 (last 20 years) | 154 |
Descriptor
Computer Science Education | 160 |
Computer Security | 160 |
Information Security | 64 |
Computer Software | 43 |
Teaching Methods | 33 |
Information Technology | 32 |
Internet | 26 |
Computer Networks | 24 |
Programming | 24 |
College Students | 23 |
Undergraduate Students | 21 |
More ▼ |
Source
Author
Lawrence, Cameron | 3 |
Armstrong, Miriam E. | 2 |
Cigularova, Daniela | 2 |
Cook, Kristin | 2 |
Cummings, Jeff | 2 |
Durkin, Sarah S. | 2 |
Fees, Rachel E. | 2 |
Ford, Vitaly | 2 |
Frydenberg, Mark | 2 |
Fulton, Eric | 2 |
Ivy, Jessica | 2 |
More ▼ |
Publication Type
Journal Articles | 160 |
Reports - Research | 94 |
Reports - Descriptive | 46 |
Reports - Evaluative | 14 |
Tests/Questionnaires | 10 |
Information Analyses | 9 |
Education Level
Audience
Teachers | 5 |
Practitioners | 1 |
Location
Maryland | 4 |
New York | 4 |
European Union | 2 |
Florida | 2 |
North Carolina | 2 |
Turkey | 2 |
United Kingdom | 2 |
California | 1 |
Denmark | 1 |
Europe | 1 |
Finland | 1 |
More ▼ |
Laws, Policies, & Programs
Equal Access | 1 |
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Daniel T. Hickey; Ronald J. Kantor – Journal of Cybersecurity Education, Research and Practice, 2024
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the "transfer" of cybersecurity learning is crucial. We compared how different recognized "cognitive" transfer theories might help explain and synergize three aspects of cybersecurity education. These include "teaching and…
Descriptors: Transfer of Training, Computer Science Education, Computer Security, Metacognition
Crowdsourcing Cyber Experts to Determine Relevant Topics during Cyber Curriculum Development Efforts
Ngac, Brian K.; Boicu, Mihai – Innovations in Education and Teaching International, 2023
The cyber security environment, its threats, and its defence strategies are constantly changing. Educational programmes and their curriculum are known to be slow changing and at times out-of-date, resulting in content that may not be as relevant to their students and the industry. This research paper will 1 -- present an overview of the curriculum…
Descriptors: Expertise, Curriculum Development, Computer Security, Computer Science Education
OConnor, T. J.; Brown, Dane; Jackson, Jasmine; Payne, Bryson; Schmeelk, Suzanna – Journal of Cybersecurity Education, Research and Practice, 2023
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to…
Descriptors: Computer Security, Computer Science Education, Gamification, Competition
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Samson O. Adeoye; Heather Lindberg; B. Bagby; Anne M. Brown; Feras A. Batarseh; Eric K. Kaufman – NACTA Journal, 2023
Cyberbiosecurity is an emerging field at the convergence of life sciences and the digital world. As technological advances improve operational processes and expose them to vulnerabilities in agriculture and life sciences, cyberbiosecurity has become increasingly important for addressing contemporary concerns. Unfortunately, at this time,…
Descriptors: Computer Security, Biology, Biological Sciences, Labor Force Development
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Saglam, Rahime Belen; Miller, Vincent; Franqueira, Virginia N. L. – IEEE Transactions on Education, 2023
Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. Research Questions: 1. What cyber security…
Descriptors: Computer Science Education, Computer Security, Children, Internet