Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 9 |
Since 2016 (last 10 years) | 14 |
Since 2006 (last 20 years) | 32 |
Descriptor
Source
Author
Aceves, Patricia A. | 1 |
Aceves, Robert I. | 1 |
Acquisti, Alessandro | 1 |
Adrian Curaj | 1 |
Alina Iura | 1 |
Anderson, Jimmeka | 1 |
Bosley, Sara | 1 |
Cezar Hâj | 1 |
Choi, Ikkyu | 1 |
Cosmin Holeab | 1 |
Davoodifard, Mashad | 1 |
More ▼ |
Publication Type
Education Level
Location
United States | 6 |
China | 2 |
Pennsylvania | 2 |
United Kingdom | 2 |
European Union | 1 |
Florida | 1 |
Illinois (Chicago) | 1 |
New York (New York) | 1 |
South Africa | 1 |
Turkey | 1 |
Laws, Policies, & Programs
Higher Education Act 1965 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
II Patrick Michael Damon – ProQuest LLC, 2023
The purpose of this study was to examine the effects of gamified training in cybersecurity concepts on individuals not employed in information technology roles compared to traditional pieces of training. As the world becomes increasingly connected technologically, so too do the cyber vulnerabilities increase, and it is essential for all types of…
Descriptors: Information Technology, Information Security, Computer Security, Gamification
Karjalainen, Mika; Ojala, Anna-Liisa; Vatanen, Marko; Lötjönen, Jarno – International Journal of Adult Education and Technology, 2022
This qualitative study includes nine semi-structured interviews with cybersecurity experts from different security-related organizations who are familiar with cybersecurity exercises. Its contribution to cybersecurity workforce development focuses on organizational learning rather than individual skills development and relevant competencies. It…
Descriptors: Computer Security, Computer Science Education, Organizational Learning, Skill Development
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Eyuboglu, Fatma Aycan Binay; Yilmaz, Fatma Gizem Karaoglan – Education Quarterly Reviews, 2022
Individuals may encounter many negativities due to the misuse of computers and the Internet. Children suffer the most from these negativities. This situation necessitates parents who always protect and stand by their children, to become knowledgeable about the safe use of computers and the Internet. In this study, we examined the opinions of the…
Descriptors: Parent Attitudes, Internet, Computer Uses in Education, Child Safety
Purpura, James E.; Davoodifard, Mashad; Voss, Erik – Language Assessment Quarterly, 2021
The online placement test for the Community English Language Program (CLP) at Teachers College, Columbia University has been administered in a computer lab since 2015. While most of the components of this placement exam system are online, including registration, exam delivery, scoring, and score reporting, the COVID-19 pandemic elevated the need…
Descriptors: Student Placement, Language Tests, Second Language Instruction, Second Language Learning
Hodge, Timothy D. – ProQuest LLC, 2018
The Department of Defense (DoD), like most very large organizations rightly have concerns over the functionality of their Cybersecurity employees and their ability to perform core duties in a professional manner. To validate this ability, the DoD imposed a mandatory certifications policy based upon positions within the organization. The DoD…
Descriptors: Public Agencies, Government Employees, Computer Security, Outcomes of Education
Choi, Ikkyu; Hao, Jiangang; Deane, Paul; Zhang, Mo – ETS Research Report Series, 2021
"Biometrics" are physical or behavioral human characteristics that can be used to identify a person. It is widely known that keystroke or typing dynamics for short, fixed texts (e.g., passwords) could serve as a behavioral biometric. In this study, we investigate whether keystroke data from essay responses can lead to a reliable…
Descriptors: Accuracy, High Stakes Tests, Writing Tests, Benchmarking
Lester, Teresa M. – ProQuest LLC, 2018
The purpose of this mixed-methods investigation was to determine how teachers and parents understood and educated themselves on cyber safety. This research explored how teachers and parents found and used resources available to stay informed of the constant threats and changes for students while online. The amount of time young people spend with…
Descriptors: Computer Security, Information Security, Teacher Attitudes, Parent Attitudes
Adrian Curaj; Cezar Hâj; Cosmin Holeab; Irina Geanta; Alina Iura; Dorin Cote?; Oana ?în?ar – European Union, 2025
The present report overseen by the Executive Agency for Higher Education, Research, Development and Innovation Funding (UEFISCDI) on behalf of the European Commission and the European Education and Culture Executive Agency as part of the contract for the implementation of the European Digital Education Hub, is the third report in a series…
Descriptors: Foreign Countries, Educational Innovation, Electronic Learning, Educational Practices
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Oliver, Kevin – Journal of Computers in Mathematics and Science Teaching, 2016
This paper presents the results of a comparison study between graduate students taking a software security course at an American university and international working professionals taking a version of the same course online through a free massive open online course (MOOC) created in the Google CourseBuilder learning environment. A goal of the study…
Descriptors: Computer Science Education, Online Courses, Graduate Students, Continuing Education
Hackney, Dennis W. G. – ProQuest LLC, 2011
Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…
Descriptors: Computer Security, Risk Management, Information Systems, Information Technology
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro – Journal of Policy Analysis and Management, 2011
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
Descriptors: Identification (Psychology), Access to Information, Deception, Computer Security
Warfield, Douglas L. – ProQuest LLC, 2011
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Descriptors: Information Technology, Industry, Computer Security, Governance
Shirley J. Caruso – Online Submission, 2016
This single instrumental qualitative case study explores and thickly describes job performance outcomes based upon the manner in which self-directed learning activities of a purposefully selected sample of 3 construction managers are conducted, mediated by the use of Web 2.0 technology. The data collected revealed that construction managers are…
Descriptors: Web 2.0 Technologies, Technology Uses in Education, Independent Study, Job Performance