Publication Date
In 2025 | 6 |
Since 2024 | 24 |
Since 2021 (last 5 years) | 56 |
Since 2016 (last 10 years) | 79 |
Since 2006 (last 20 years) | 96 |
Descriptor
Computer Science Education | 97 |
Computer Security | 97 |
Information Security | 47 |
Computer Software | 25 |
Undergraduate Students | 18 |
Teaching Methods | 17 |
Information Technology | 16 |
Internet | 16 |
Foreign Countries | 15 |
Case Studies | 12 |
College Students | 12 |
More ▼ |
Source
Author
Armstrong, Miriam E. | 2 |
Cook, Kristin | 2 |
Cummings, Jeff | 2 |
Daniel L. Segal | 2 |
David Kocsis | 2 |
Ford, Vitaly | 2 |
Frydenberg, Mark | 2 |
Ivy, Jessica | 2 |
Janicki, Thomas | 2 |
Jones, Keith S. | 2 |
Lawrence, Cameron | 2 |
More ▼ |
Publication Type
Reports - Research | 97 |
Journal Articles | 96 |
Tests/Questionnaires | 12 |
Information Analyses | 4 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Teachers | 1 |
Location
European Union | 2 |
Florida | 2 |
Turkey | 2 |
United Kingdom | 2 |
Colorado (Colorado Springs) | 1 |
Denmark | 1 |
Georgia | 1 |
Indiana | 1 |
Israel | 1 |
Lesotho | 1 |
Massachusetts | 1 |
More ▼ |
Laws, Policies, & Programs
Equal Access | 1 |
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Samson O. Adeoye; Heather Lindberg; B. Bagby; Anne M. Brown; Feras A. Batarseh; Eric K. Kaufman – NACTA Journal, 2023
Cyberbiosecurity is an emerging field at the convergence of life sciences and the digital world. As technological advances improve operational processes and expose them to vulnerabilities in agriculture and life sciences, cyberbiosecurity has become increasingly important for addressing contemporary concerns. Unfortunately, at this time,…
Descriptors: Computer Security, Biology, Biological Sciences, Labor Force Development
Nicolai Plintz; Dirk Ifenthaler – International Association for Development of the Information Society, 2024
This study aims to develop a preliminary model for the content validation of serious games, specifically to assess two cybersecurity games designed for children aged 8-13 years as part of the Erasmus+ project "SuperCyberKids". Using a scoping review of databases from pedagogy, psychology, and computer science, we identified current…
Descriptors: Computer Security, Educational Games, Computer Uses in Education, Game Based Learning
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Raj Kumar Dhungana; Lina Gurung; Hem Poudyal – Journal of Cybersecurity Education, Research and Practice, 2023
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with…
Descriptors: Computer Security, Age Groups, Foreign Countries, Knowledge Level
Ryan Straight – Journal of Cybersecurity Education, Research and Practice, 2024
This study applies a posthuman lens to the National Initiative for Cybersecurity Education (NICE) Workforce Framework, examining two key Work Roles in cybersecurity education. Employing a novel posthuman coding scheme, the associated Tasks, Knowledge, and Skills (TKS) statements were analyzed. Findings reveal significant posthuman elements within…
Descriptors: Computer Security, Computer Science Education, Job Skills, Ability
Gary A. Harris – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist in the United States and globally and are well documented in literature. This study examined what state universities are doing to help address the…
Descriptors: State Universities, Computer Security, Professional Personnel, Labor Supply
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Embracing Artificial Intelligence to Improve Self-Directed Learning: A Cybersecurity Classroom Study
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security