NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Meets WWC Standards with or without Reservations1
Showing 1 to 15 of 476 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nicolai Plintz; Dirk Ifenthaler – International Association for Development of the Information Society, 2024
This study aims to develop a preliminary model for the content validation of serious games, specifically to assess two cybersecurity games designed for children aged 8-13 years as part of the Erasmus+ project "SuperCyberKids". Using a scoping review of databases from pedagogy, psychology, and computer science, we identified current…
Descriptors: Computer Security, Educational Games, Computer Uses in Education, Game Based Learning
Cheryl Resch – ProQuest LLC, 2024
Software vulnerabilities in commercial products are an issue of national importance. The most prevalent breaches are input validation vulnerabilities, and these are easily avoidable. This dissertation contributes to cybersecurity education with a set of hands-on interventions tailored for three CS courses, a set of reflection prompts to encourage…
Descriptors: College Students, Computer Science Education, Computer Security, Curriculum Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jeff Strain; Jim Marquardson; David Lee Gomillion – Information Systems Education Journal, 2025
Information systems students yearn for hands-on, active learning experiences that teach relevant skills. Delivering these experiences requires repeatable, secure, and scalable computing infrastructure. Unfortunately, many institutions struggle with the capital and operational costs of hosting in-house computing environments. Some educational…
Descriptors: Information Systems, Computer Science Education, Best Practices, Computer Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Felix Winkelnkemper; Lukas Höper; Carsten Schulte – Informatics in Education, 2024
When it comes to mastering the digital world, the education system is more and more facing the task of making students competent and self-determined agents when interacting with digital artefacts. This task often falls to computing education. In the traditional fields of computing education, a plethora of models, guidelines, and principles exist,…
Descriptors: Digital Literacy, Computer Uses in Education, Models, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yuwamon Prasretsung; Naruemon Thepnuan; Duangkamol Kaewdaeng – Turkish Online Journal of Educational Technology - TOJET, 2024
The objectives of this research were to: 1) develop online lessons with the Google Classroom application on computer system operation for secondary 2 (Grade 8) students; 2) study pre-test and post-test academic achievement; and 3) study the students' satisfaction with the online lessons with the Google Classroom application on computer system…
Descriptors: Computer Software, Electronic Learning, Computers, Curriculum Development
Edem Kwesi Atatsi – ProQuest LLC, 2024
Organizations are looking for a well-qualified workforce with the requisite skills, knowledge, and abilities to implement an effective cyber strategy. Academic institutions are facing challenges in meeting the demand for employees with hands-on experience. This exploratory study investigated how academic institutions can use internships to equip…
Descriptors: Internship Programs, Entry Workers, Professional Personnel, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ngac, Brian K.; Boicu, Mihai – Innovations in Education and Teaching International, 2023
The cyber security environment, its threats, and its defence strategies are constantly changing. Educational programmes and their curriculum are known to be slow changing and at times out-of-date, resulting in content that may not be as relevant to their students and the industry. This research paper will 1 -- present an overview of the curriculum…
Descriptors: Expertise, Curriculum Development, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Samim Mirhosseini – ProQuest LLC, 2023
Computer science instructors typically have many responsibilities, such as creating material, delivering lectures, clarifying student questions, and grading student deliverables, while the demand for computer science education has been increasing. Handling all of these responsibilities is challenging in itself. However, it is made worse when…
Descriptors: Computer Science Education, Teacher Responsibility, Faculty Workload, Instructional Materials
Peer reviewed Peer reviewed
Direct linkDirect link
Demetrios Sampson; Panagiotis Kampylis; Jesús Moreno-León; Stefania Bocconi – Smart Learning Environments, 2025
This paper explores the evolving landscape of informatics education in European primary and secondary schools, analysing academic and grey literature to define the state of play and open questions related to 'high-quality informatics education'. It underlines the strategic importance of promoting high-quality informatics education to prepare…
Descriptors: Foreign Countries, Elementary Secondary Education, Computer Science, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Aidan Doyle; Pragnya Sridhar; Arav Agarwal; Jaromir Savelka; Majd Sakr – Journal of Computer Assisted Learning, 2025
Background: In computing education, educators are constantly faced with the challenge of developing new curricula, including learning objectives (LOs), while ensuring that existing courses remain relevant. Large language models (LLMs) were shown to successfully generate a wide spectrum of natural language artefacts in computing education.…
Descriptors: Computer Science Education, Artificial Intelligence, Learning Objectives, Curriculum Development
Peer reviewed Peer reviewed
Direct linkDirect link
Justin Gambrell; Eric Brewe – Physical Review Physics Education Research, 2024
Computational thinking in physics has many different forms, definitions, and implementations depending on the level of physics or the institution it is presented in. To better integrate computational thinking in introductory physics, we need to understand what physicists find important about computational thinking in introductory physics. We…
Descriptors: Physics, Introductory Courses, Science Instruction, Thinking Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Saglam, Rahime Belen; Miller, Vincent; Franqueira, Virginia N. L. – IEEE Transactions on Education, 2023
Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. Research Questions: 1. What cyber security…
Descriptors: Computer Science Education, Computer Security, Children, Internet
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  32