Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Security | 10 |
Curriculum Implementation | 10 |
Information Security | 4 |
Computer Science Education | 3 |
Pretests Posttests | 3 |
Teacher Attitudes | 3 |
Case Studies | 2 |
Curriculum Development | 2 |
Instructional Effectiveness | 2 |
Internet | 2 |
Student Attitudes | 2 |
More ▼ |
Source
ProQuest LLC | 4 |
Journal of Information… | 2 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Educational… | 1 |
Quarterly Review of Distance… | 1 |
Author
Publication Type
Journal Articles | 6 |
Dissertations/Theses -… | 4 |
Reports - Research | 3 |
Reports - Evaluative | 2 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 5 |
Middle Schools | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
Intermediate Grades | 1 |
Junior High Schools | 1 |
Secondary Education | 1 |
More ▼ |
Audience
Teachers | 1 |
Location
China | 1 |
District of Columbia | 1 |
Idaho | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Shaobin Chen; Qingrong Li; Tao Wang – International Journal of Information and Communication Technology Education, 2024
This study aims to assess the implementation of smart campus and the students' learning engagement at Zhongshan College, China. A well-structured questionnaire was developed, and information was collected from 277 students and 377 teachers. The results indicate that both groups of respondents highly agree on the construction levels of the smart…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Learner Engagement
Jakob E. Barnard – ProQuest LLC, 2022
This project examined the adoption of cybersecurity into computing programs within liberal arts programs and whether the rate constitutes an innovative program. The research questions focused on the lived experience existing faculty members have had with the cybersecurity curriculum within liberal arts computing programs. Liberal arts general…
Descriptors: Hermeneutics, Phenomenology, Computer Security, Computer Science Education
James J. Meadows III – ProQuest LLC, 2023
The purpose of this exploratory qualitative study was to explore the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. My study addressed whether security training for teenagers will solve the…
Descriptors: Middle School Students, Public Schools, Gamification, Educational Games
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Improving Belonging and Connectedness in the Cybersecurity Workforce: From College to the Profession
Mary Beth Klinger – Journal of Cybersecurity Education, Research and Practice, 2024
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students' sense of belonging and connectedness in the…
Descriptors: Computer Security, Sense of Community, Associate Degrees, Community College Students
O'Brien, Churairat – ProQuest LLC, 2019
As young children increasingly use the Internet, the children need to learn and apply cybersecurity fundamentals to protect personal data. Teaching young students the basics of strong passwords and data protection in a K-12 classroom setting is an obvious starting point. The literature shows an absence of approved cybersecurity curriculums for use…
Descriptors: Teacher Attitudes, Information Security, Computer Security, Teaching Methods
Harris, Mark A.; Patten, Karen P. – Journal of Information Systems Education, 2015
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Descriptors: Taxonomy, Computer Security, Curriculum Development, Undergraduate Study
McNulty, John; Chandrasekhar, Arcot; Hoyt, Amy; Gruener, Gregory; Espiritu, Baltazar; Price, Ron, Jr. – Journal of Educational Computing Research, 2011
This report summarizes more than a decade of experiences with implementing computer-based testing across a 4-year medical curriculum. Practical considerations are given to the fields incorporated within an item database and their use in the creation and analysis of examinations, security issues in the delivery and integrity of examinations,…
Descriptors: Educational Research, Testing, Integrity, Computer Assisted Testing
Boyle, Clifton J., III – ProQuest LLC, 2010
Misuse of technology is a behavioral pattern that continues to emerge in our society. Television and newspapers continue to list and report technology misuse. A recent study from the Pew Internet and American Life Project has indicated approximately one third of teen are victims of online harassment (Lenhart, 2009). Other prominent problems with…
Descriptors: Control Groups, Urban Schools, Citizenship, Video Games
Tabor, Sharon W. – Quarterly Review of Distance Education, 2007
Distance education has become an expectation with students who have grown up with technology as well as nontraditional and working students. Most universities now offer a wide range of online courses and degree programs to meet these needs. Online delivery of technology courses, however, has been problematic when the course includes very complex…
Descriptors: Distance Education, Online Courses, Computer Security, Information Science Education