Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Science Education | 11 |
Computer Security | 11 |
Course Content | 11 |
Information Security | 7 |
Teaching Methods | 7 |
Computer Software | 5 |
Curriculum Design | 3 |
Curriculum Development | 3 |
Foreign Countries | 3 |
Barriers | 2 |
Computer Assisted Testing | 2 |
More ▼ |
Source
Author
Andrej Jerman Blažic | 1 |
Antonenko, Pavlo | 1 |
Astrom, Peik | 1 |
Bergstrom, Laura | 1 |
Blažic, Borka Jerman | 1 |
Borka Jerman Blažic | 1 |
Dawson, Kara | 1 |
Dunn, Deborah | 1 |
Franqueira, Virginia N. L. | 1 |
Grahn, Kaj J. | 1 |
Herr, Trey | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 6 |
Reports - Descriptive | 3 |
Information Analyses | 2 |
Speeches/Meeting Papers | 2 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 4 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Grade 3 | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
High Schools | 1 |
Intermediate Grades | 1 |
Middle Schools | 1 |
Primary Education | 1 |
More ▼ |
Audience
Location
Europe | 1 |
European Union | 1 |
Finland | 1 |
Maryland | 1 |
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Saglam, Rahime Belen; Miller, Vincent; Franqueira, Virginia N. L. – IEEE Transactions on Education, 2023
Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. Research Questions: 1. What cyber security…
Descriptors: Computer Science Education, Computer Security, Children, Internet
Borka Jerman Blažic; Andrej Jerman Blažic – International Society for Technology, Education, and Science, 2024
Based on an exhaustive study from 2001-2003 involving 14 high schools in the EU, a definition of the educational content and the aligned methodology for high school levels was developed for two areas--cyber safety and cybersecurity--with the aim of improving the knowledge and skills of students and their teachers. Available sources, including…
Descriptors: Teaching Methods, Computer Science Education, Information Security, Computer Security
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Herr, Trey; Laudrain, Arthur P. B.; Smeets, Max – Journal of Political Science Education, 2021
Colleges and universities continue to expand their curricula to include cybersecurity as an explicit course of study in political science. But what is taught in a course on cybersecurity? Are syllabi deep dives into technology, broad romps through contemporary policy debates, or do they reflect a more varied disposition? Studying the syllabi of an…
Descriptors: Computer Science Education, Computer Security, Information Security, Political Science
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Dunn, Deborah – Association of Small Computer Users in Education (ASCUE), 2005
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
Descriptors: Databases, Information Technology, Computer Security, Computer Literacy
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks