Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 5 |
| Since 2017 (last 10 years) | 7 |
| Since 2007 (last 20 years) | 7 |
Descriptor
| Computer Science Education | 7 |
| Computer Security | 7 |
| Gender Differences | 7 |
| Foreign Countries | 3 |
| Information Security | 3 |
| Knowledge Level | 3 |
| Student Attitudes | 3 |
| Technological Literacy | 3 |
| Age Differences | 2 |
| College Students | 2 |
| Computer Simulation | 2 |
| More ▼ | |
Source
| Journal of Cybersecurity… | 2 |
| Education and Information… | 1 |
| Educational Process:… | 1 |
| International Association for… | 1 |
| International Journal of… | 1 |
| Journal of Information… | 1 |
Author
| Abiniah Sriskantharajah | 1 |
| Agarsha Manoharan | 1 |
| Bhoomin B. Chauhan | 1 |
| Bryson Payne | 1 |
| C. Lindsay Linsky | 1 |
| Carlie Swords | 1 |
| Catherine Diresta | 1 |
| Cummings, Jeff | 1 |
| Curtice Gough | 1 |
| Daniel Baker | 1 |
| Gina Childers | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 6 |
| Reports - Research | 6 |
| Collected Works - Proceedings | 1 |
Education Level
| Secondary Education | 4 |
| Elementary Education | 3 |
| Postsecondary Education | 3 |
| High Schools | 2 |
| Higher Education | 2 |
| Junior High Schools | 2 |
| Middle Schools | 2 |
| Elementary Secondary Education | 1 |
| Grade 7 | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gina Childers; Weverton Ataide Pinheiro; Oluwatosin Daramola; C. Lindsay Linsky; Bryson Payne; Jack Byers; Daniel Baker – Journal of Cybersecurity Education, Research and Practice, 2025
Because K-12 teachers have access to private educational data, they are increasingly at risk of being affected by cybersecurity threats. Examining how teachers conceptualize cybersecurity is vital so that cybersecurity training can be tailored to teachers' understanding of cybersecurity. This study examined K-12 teachers' (n = 255) personalized…
Descriptors: Teacher Attitudes, Knowledge Level, Definitions, Computer Security
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Maureen Namukasa; Bhoomin B. Chauhan; Carlie Swords; Curtice Gough; Weronika Dymanus; Catherine Diresta; John Vitali; Vivek Sharma; T. J. OConnor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2025
This study aimed to evaluate the effectiveness of an eight-module Cybersecurity course at increasing the learning outcomes of middle and high school students with little to no experience in Computer Science and Cybersecurity, including underrepresented minorities (URMs) in Cybersecurity. Twice we administered and evaluated the Cybersecurity…
Descriptors: Computer Security, Internet, Instructional Effectiveness, Middle School Students
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Maja Videnovik; Tone Vold; Linda Kiønig; Vladimir Trajkovik – International Journal of Game-Based Learning, 2025
This study examines whether game-based learning can be used as a promising strategy for fostering students' engagement and motivation. Researchers investigate students' perceptions of the effectiveness of three educational games designed to teach cybersecurity in primary schools: an escape room-style game, a treasure hunt game, and a quiz…
Descriptors: Foreign Countries, Game Based Learning, Learner Engagement, Student Empowerment
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation

Peer reviewed
Direct link
