Publication Date
| In 2026 | 0 |
| Since 2025 | 22 |
| Since 2022 (last 5 years) | 100 |
| Since 2017 (last 10 years) | 157 |
| Since 2007 (last 20 years) | 207 |
Descriptor
| Computer Science Education | 217 |
| Computer Security | 217 |
| Information Security | 90 |
| Computer Software | 52 |
| Information Technology | 49 |
| Teaching Methods | 45 |
| Internet | 34 |
| College Students | 31 |
| Foreign Countries | 31 |
| Programming | 31 |
| Undergraduate Students | 29 |
| More ▼ | |
Source
Author
| Lawrence, Cameron | 3 |
| Paul Wagner | 3 |
| Andrej Jerman Blažic | 2 |
| Armstrong, Miriam E. | 2 |
| Borka Jerman Blažic | 2 |
| Cigularova, Daniela | 2 |
| Cook, Kristin | 2 |
| Cummings, Jeff | 2 |
| Daniel L. Segal | 2 |
| David Kocsis | 2 |
| Durkin, Sarah S. | 2 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 5 |
| Practitioners | 2 |
| Policymakers | 1 |
Location
| New York | 5 |
| Maryland | 4 |
| European Union | 3 |
| Florida | 3 |
| Pennsylvania | 3 |
| Thailand | 3 |
| Turkey | 3 |
| United Kingdom | 3 |
| Arizona | 2 |
| Australia | 2 |
| Connecticut | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Equal Access | 1 |
Assessments and Surveys
| ACT Assessment | 1 |
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Owusu, Samuel – ProQuest LLC, 2023
Cybersecurity job roles and responsibilities constantly evolve due to technological advancements, complex infrastructure, and increasing cybersecurity threats and regulations. As a result, organizations require a highly skilled and experienced cybersecurity workforce in both the public and private sectors. Many colleges and universities offer…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Robert Chapa – ProQuest LLC, 2024
While the cybersecurity landscape continually evolves, with new technologies, attack vectors, and defense mechanisms emerging regularly, cybersecurity certificate programs remain challenged to stay current and relevant, often resulting in the delivery of outdated course content in existing programs. Scholars note that the absence of standardized…
Descriptors: Program Development, Computer Security, Electronic Learning, Certification
Nicolai Plintz; Dirk Ifenthaler – International Association for Development of the Information Society, 2024
This study aims to develop a preliminary model for the content validation of serious games, specifically to assess two cybersecurity games designed for children aged 8-13 years as part of the Erasmus+ project "SuperCyberKids". Using a scoping review of databases from pedagogy, psychology, and computer science, we identified current…
Descriptors: Computer Security, Educational Games, Computer Uses in Education, Game Based Learning
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Maria Lamond; Suzanne Prior; Karen Renaud; Lara A. Wood – Discover Education, 2025
Digital technology is a part of children's everyday lives, yet very little known about teachers' perceptions and practice of cybersecurity education in primary education. This study aimed to shed light on this, focusing primarily on children's password practices. A questionnaire was distributed to primary school teachers across Scotland, with 114…
Descriptors: Elementary School Teachers, Teacher Attitudes, Computer Security, Information Security
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Robert Beveridge – ProQuest LLC, 2021
With the increase in cybercrime costing organizations financial loss and loss to their reputation, the need to hire qualified and experienced employees is paramount. As the gap in the workforce shortage widens, cybersecurity education and training institutions are struggling to produce a capable workforce with enough experience and skills that…
Descriptors: Crime Prevention, Computer Security, Computer Simulation, Computer Science Education
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Saglam, Rahime Belen; Miller, Vincent; Franqueira, Virginia N. L. – IEEE Transactions on Education, 2023
Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. Research Questions: 1. What cyber security…
Descriptors: Computer Science Education, Computer Security, Children, Internet

Direct link
Peer reviewed
