Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 10 |
| Since 2017 (last 10 years) | 10 |
| Since 2007 (last 20 years) | 13 |
Descriptor
| Barriers | 13 |
| Computer Science Education | 13 |
| Computer Security | 13 |
| Information Security | 5 |
| Teaching Methods | 4 |
| Artificial Intelligence | 3 |
| Computer Software | 3 |
| Curriculum Design | 3 |
| Difficulty Level | 3 |
| Distance Education | 3 |
| Foreign Countries | 3 |
| More ▼ | |
Source
Author
| Paul Wagner | 2 |
| Abdel-Karim Al-Tamimi | 1 |
| Antonenko, Pavlo | 1 |
| Argyro Chatzopoulou | 1 |
| Brendan Bertone | 1 |
| Cherrise Ficke | 1 |
| Connor David Nelson | 1 |
| Dalal Alharthi | 1 |
| Dawson, Kara | 1 |
| Edwards, John | 1 |
| Hart, Kaden | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 11 |
| Reports - Research | 8 |
| Information Analyses | 2 |
| Tests/Questionnaires | 2 |
| Collected Works - Proceedings | 1 |
| Dissertations/Theses -… | 1 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 5 |
| Postsecondary Education | 5 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
| Grade 3 | 1 |
| Grade 4 | 1 |
| Grade 5 | 1 |
| High Schools | 1 |
| Intermediate Grades | 1 |
| Middle Schools | 1 |
| More ▼ | |
Audience
Location
| Florida | 2 |
| Arizona | 1 |
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Europe | 1 |
| Germany | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
What Works Clearinghouse Rating
Brendan Bertone; Paul Wagner; Joshua Pauli – Journal of Cybersecurity Education, Research and Practice, 2025
The cybersecurity profession continues to face a significant shortfall of qualified professionals despite steady growth in degree programs. Employers consistently cite experience as the main barrier for entrylevel cybersecurity hires. This paper argues that clinic-based experiential learning offers a scalable solution to that preparation gap. A…
Descriptors: Computer Science Education, Computer Security, Experiential Learning, Conventional Instruction
Raj Kumar Dhungana; Lina Gurung; Hem Poudyal – Journal of Cybersecurity Education, Research and Practice, 2023
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with…
Descriptors: Computer Security, Age Groups, Foreign Countries, Knowledge Level
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Paul Wagner; Dalal Alharthi – Journal of Cybersecurity Education, Research and Practice, 2024
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that…
Descriptors: Artificial Intelligence, Computer Simulation, Information Technology, Computer Security
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Martin, Nancy; Woodward, Belle – Information Systems Education Journal, 2013
Now more than ever, cybersecurity professionals are in demand and the trend is not expected to change anytime soon. Currently, only a small number of educational programs are funded and equipped to educate cybersecurity professionals and those few programs cannot train a workforce of thousands in a relatively short period of time. Moreover, not…
Descriptors: Computer Security, Labor Force Development, Hands on Science, Experiential Learning
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
Direct link
