NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing 1 to 15 of 82 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zorlu, Eyup – Journal of Learning and Teaching in Digital Age, 2023
The purpose of this study is to examine the relationship between college students' cyberbullying awareness and their ability to ensure their personal cybersecurity. A total of 401 students participated in this study. The Ability to Ensure Personal Cybersecurity Scale, the Cyberbullying Awareness Scale, and a Personal Information Form developed by…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Feray Küçükbas Duman – European Journal of Education (EJED), 2022
The most practical and fastest way to access information in today's world is via the internet. Thanks to the internet, the necessary information can be reached in a short time. Nevertheless, in addition to the benefits of the internet, it can also pose risks for users. For this reason, it is important to increase the level of awareness of…
Descriptors: Undergraduate Students, Physical Education, Student Behavior, Internet
Boyce, Stephen – ProQuest LLC, 2021
The world continues to be plagued by cyber incidents that impact businesses, schools, hospitals, and government institutions. Some organizations have given cybersecurity a line item on the annual budget, while others have created dedicated departments to improve their technical defenses. Executive boards and C-level executives have shifted from an…
Descriptors: Demography, Decision Making, Computer Security, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Jacqui Taylor; Monica Whitty – Psychology Learning and Teaching, 2024
We propose that psychology graduates are uniquely placed to work in the cybersecurity industry due to their understanding of human behavior and the possession of skills needed to address cybersecurity issues. However, there are challenges in attracting psychology graduates to the cybersecurity industry as they may not be fully aware of how skills…
Descriptors: Psychology, Majors (Students), Student Attitudes, Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thitima Srivatanakul – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification, including game-based learning (GBL), is a widely recognized pedagogical approach used for imparting and reinforcing cybersecurity knowledge and skills to learners. One innovative form of GBL gaining popularity across various educational levels, from secondary schools to professional development, is escape room-style education. This…
Descriptors: Computer Security, Problem Solving, Gamification, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
David Javier-Aliaga; Oscar Rubén Silva Neyra; Yaquelin E. Calizaya-Milla; Jacksaint Saintila – Contemporary Educational Technology, 2024
The objective of this study is to determine the relationship between academic self-efficacy and digital competence in a sample of undergraduate university students in Peru. The design was nonexperimental, cross-sectional, and correlational. The non-probabilistic sample consisted of 98 students from a private university in Peru. Academic…
Descriptors: Self Efficacy, Competence, Digital Literacy, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Anwesa Das; Vinay Kumar; Aditya Narayan Hati; Sharda Bharti – IEEE Transactions on Education, 2024
Machine learning (ML) is increasingly utilized in the development and assurance of safety-critical systems (SCSs) nowadays, much like other complex problems. Safety is the topmost priority in SCS, hence, developers who are working in this area must possess extensive knowledge of both ML and SCS. This article presents a methodical investigation…
Descriptors: Artificial Intelligence, Computer Security, Engineering Education, Engineering
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
G. S. Prakasha; Juan José Leiva-Olivencia; Amber Simpson; Trent Grundmeyer; Anthony Kenneth – Computers in the Schools, 2024
Higher education students use digital devices for learning, entertainment, and financial transactions. The present study examines undergraduate (UG) students' challenges faced in cyber security space amid digital environments. The study employed a qualitative research design with a narrative inquiry method to capture the lived experiences,…
Descriptors: Student Experience, Barriers, Coping, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Felichism Kabo; Annaliese Paulson; Doreen Bradley; Ken Varnum; Stephanie Teasley – College & Research Libraries, 2024
Seeking to better understand the longitudinal association between online usage of library-licensed content and short- and long-term student performance, we linked EZproxy logs to institutional university data to study how library usage impacts semester and cumulative GPAs. Panel linear mixed effects regression models indicate online library usage…
Descriptors: Undergraduate Students, Academic Achievement, Contracts, Bibliographic Databases
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Peer reviewed Peer reviewed
Direct linkDirect link
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6