NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Saglam, Rahime Belen; Miller, Vincent; Franqueira, Virginia N. L. – IEEE Transactions on Education, 2023
Contribution: This article presents a systematic literature review of research concerning cyber security education for children (under 18s) on a global scale. Background: While the Internet brings great convenience to children, it can potentially cause harms due to lack of knowledge about online risks. Research Questions: 1. What cyber security…
Descriptors: Computer Science Education, Computer Security, Children, Internet
Childs, Dawn – ProQuest LLC, 2023
Cyberattacks in the United States have consistently increased over recent years, and there is no apparent end to this upward trend. The increase in these attacks has resulted in successful cyber incidents and breaches of large, small, and medium-sized organizations across varied locales and industries. The hospitality industry has not been immune…
Descriptors: Hospitality Occupations, Professional Education, Curriculum, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Herr, Trey; Laudrain, Arthur P. B.; Smeets, Max – Journal of Political Science Education, 2021
Colleges and universities continue to expand their curricula to include cybersecurity as an explicit course of study in political science. But what is taught in a course on cybersecurity? Are syllabi deep dives into technology, broad romps through contemporary policy debates, or do they reflect a more varied disposition? Studying the syllabi of an…
Descriptors: Computer Science Education, Computer Security, Information Security, Political Science
Victor Ramon Arenas – ProQuest LLC, 2021
Cybersecurity faculty do not have the time to respond to the rapid and pervasive cybersecurity academic landscape. For faculty to respond to this challenge, they are expected to continuously adapt to remain competitive. The purpose of this descriptive phenomenological study was to explore the cybersecurity faculty's perceptions of their need to…
Descriptors: Course Content, Computer Security, Professional Education, Industry
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dinc, Emre – Contemporary Educational Technology, 2019
This study examined the thoughts of preservice teachers about technology integration and collected their ideas about possible barriers to technology integration in education. With this aim, the participants were asked two key questions which are (1) "What does 'Technology Integration in Education' mean to you?" and (2) "What might…
Descriptors: Preservice Teachers, Technology Integration, Educational Technology, Budgets
O'Brien, Churairat – ProQuest LLC, 2019
As young children increasingly use the Internet, the children need to learn and apply cybersecurity fundamentals to protect personal data. Teaching young students the basics of strong passwords and data protection in a K-12 classroom setting is an obvious starting point. The literature shows an absence of approved cybersecurity curriculums for use…
Descriptors: Teacher Attitudes, Information Security, Computer Security, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Previous Page | Next Page »
Pages: 1  |  2