Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 19 |
Since 2016 (last 10 years) | 30 |
Since 2006 (last 20 years) | 42 |
Descriptor
Computer Security | 42 |
Experiential Learning | 42 |
Computer Science Education | 24 |
Information Security | 17 |
Computer Software | 11 |
Information Technology | 11 |
Computer Networks | 10 |
Learning Activities | 9 |
Undergraduate Students | 9 |
Educational Technology | 8 |
Student Attitudes | 8 |
More ▼ |
Source
Author
Durkin, Sarah S. | 2 |
Fees, Rachel E. | 2 |
Moran, Angela L. | 2 |
Murray, Mark M. | 2 |
da Rosa, Jennifer A. | 2 |
Abasi-amefon O. Affia | 1 |
Abhishek Vaish | 1 |
Adriane B. Randolph | 1 |
Ahamed, Sheikh | 1 |
Alexander Nolte | 1 |
Anna E. Kosloski | 1 |
More ▼ |
Publication Type
Journal Articles | 33 |
Reports - Research | 19 |
Reports - Descriptive | 12 |
Dissertations/Theses -… | 6 |
Reports - Evaluative | 3 |
Collected Works - Proceedings | 2 |
Tests/Questionnaires | 2 |
Books | 1 |
Information Analyses | 1 |
Education Level
Audience
Policymakers | 1 |
Practitioners | 1 |
Location
Maryland | 2 |
Virginia | 2 |
Albania | 1 |
Arizona | 1 |
Austria (Vienna) | 1 |
Canada | 1 |
China | 1 |
Connecticut | 1 |
Croatia | 1 |
Finland | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
What Works Clearinghouse Rating
Edem Kwesi Atatsi – ProQuest LLC, 2024
Organizations are looking for a well-qualified workforce with the requisite skills, knowledge, and abilities to implement an effective cyber strategy. Academic institutions are facing challenges in meeting the demand for employees with hands-on experience. This exploratory study investigated how academic institutions can use internships to equip…
Descriptors: Internship Programs, Entry Workers, Professional Personnel, Computer Security
Owusu, Samuel – ProQuest LLC, 2023
Cybersecurity job roles and responsibilities constantly evolve due to technological advancements, complex infrastructure, and increasing cybersecurity threats and regulations. As a result, organizations require a highly skilled and experienced cybersecurity workforce in both the public and private sectors. Many colleges and universities offer…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
Kate Quintana; Caroline Sutton Chubb; Daniel Olson; Anna E. Kosloski – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has become increasingly important not only in the technology sector but in criminal justice professions as well, and significant challenges have arisen as a result. However, these challenges are not well discussed in the literature. To address this gap, and to study the cybersecurity trends impacting criminal justice professionals…
Descriptors: Computer Security, Knowledge Level, Criminal Law, Role Theory
Humayun Zafar; Carole L. Hollingsworth; Tridib Bandyopadhyay; Adriane B. Randolph – Journal of Cybersecurity Education, Research and Practice, 2024
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus on efforts in the Southeast region of the United States. The discussion features insights from a panel consisting of an academic cybersecurity…
Descriptors: Computer Security, Career Pathways, Computer Science Education, Industry
Desmet, Ophélie A.; Crimmins, Danielle M.; Flewellen, Gerniya; Seigfried-Spellar, Kathryn C. – Gifted Child Today, 2023
The purpose of the present study was to evaluate a cybersecurity and digital forensics enrichment program for gifted and talented students to determine students' perceptions of this enrichment course. We evaluated data from 25 secondary education students and one educator to examine their perceptions of the program. Responses from students and the…
Descriptors: Academically Gifted, Secondary School Students, Student Attitudes, Program Evaluation
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Ibrahim, Ahmed; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2021
DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for…
Descriptors: Information Security, Computer Security, Educational Resources, Active Learning
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Luse, Andy; Burkman, Jim – Journal of Cybersecurity Education, Research and Practice, 2021
Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner,…
Descriptors: Computer Security, Information Security, Deception, Student Projects
Kellie Johnson; Tiffany Drape; Joseph Oakes; Joseph Simpson; Anne M. Brown; Donna Westfall-Rudd – Journal of Cybersecurity Education, Research and Practice, 2024
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the 'hidden curriculum' of seeking internships and jobs. Exposing students through…
Descriptors: Agriculture, Biological Sciences, Curriculum, Biological Influences
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Yuli Deng – ProQuest LLC, 2021
Personalized learning is gaining popularity in online computer science education due to its characteristics of pacing the learning progress and adapting the instructional approach to each individual learner from a diverse background. Among various instructional methods in computer science education, hands-on labs have unique requirements of…
Descriptors: Individualized Instruction, Experiential Learning, Computer Science Education, Electronic Learning