NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 35 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Minjuan; Yu, Haiyang; Bell, Zerla; Chu, Xiaoyan – IEEE Transactions on Learning Technologies, 2022
The Metaverse is a network of 3-D virtual worlds supporting social connections among its users and enabling them to participate in activities mimicking real life. It merges physical and virtual reality and provides channels for multisensory interactions and immersions in a variety of environments (Mystakidis, 2022). The Metaverse is considered the…
Descriptors: Technology Uses in Education, Computer Simulation, Educational Environment, Best Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Workman, Michael D. – Journal of Cybersecurity Education, Research and Practice, 2021
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of…
Descriptors: Computer Security, Information Security, Computer Science Education, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Sungkur, Roopesh Kevin; Maharaj, Manoj S. – Education and Information Technologies, 2021
Teaching and Learning confined to within the four walls of a classroom or even online Learning through Massive Online Courses (MOOCs) and other Learning Content Management Systems (LCMS) are no longer seen as the optimal approach for competency and skills development, especially for working professionals. Each of these busy learners have their own…
Descriptors: Foreign Countries, Electronic Learning, Educational Environment, Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Liew, Tze Wei; Pang, Wei Ming; Leow, Meng Chew; Tan, Su-Mae – Smart Learning Environments, 2022
Emotional design refers to imbuing a multimedia learning environment with design attributes that promote learners' positive affect and motivation to enhance learning. One such feature is anthropomorphism, in which human-like attributes are infused into learning elements in a multimedia learning environment. This study examines the affective,…
Descriptors: Multimedia Instruction, Instructional Design, Multimedia Materials, Human Body
Murphy, Colleen F. – ProQuest LLC, 2018
By 2020, the global need for information security professionals is expected to reach six million and the shortfall in meeting that need is expected to be over one and a half million. Not only is there a shortage of cybersecurity professionals but those who are graduates of a cybersecurity program are not adequately skilled to assume significant…
Descriptors: Instructional Design, Computer Security, Information Security, Labor Force Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Peer reviewed Peer reviewed
Direct linkDirect link
Cifuentes, Laurent; Mercer, Rene; Alverez, Omar; Bettati, Riccardo – TechTrends: Linking Research and Practice to Improve Learning, 2010
We report on the design, development, implementation, and evaluation of a case-based instructional environment designed for learning network engineering skills for cybersecurity. We describe the societal problem addressed, the theory-based solution, and the preliminary testing and evaluation of that solution. We identify an architecture for…
Descriptors: Case Method (Teaching Technique), Problem Solving, Scaffolding (Teaching Technique), Instructional Design
Previous Page | Next Page »
Pages: 1  |  2  |  3