Publication Date
In 2025 | 20 |
Since 2024 | 156 |
Since 2021 (last 5 years) | 416 |
Since 2016 (last 10 years) | 640 |
Since 2006 (last 20 years) | 1218 |
Descriptor
Computer Security | 1585 |
Internet | 467 |
Information Security | 441 |
Information Technology | 430 |
Foreign Countries | 268 |
Privacy | 266 |
Computer Software | 263 |
Computer Networks | 247 |
Higher Education | 243 |
Educational Technology | 219 |
Computer Science Education | 199 |
More ▼ |
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Breitinger, Frank; Tully-Doyle, Ryan; Przyborski, Kristen; Beck, Lauren; Harichandran, Ronald S. – Education and Information Technologies, 2021
Although cybersecurity is a major present concern, it is not a required subject in University. In response, we developed "Cyber World" which introduces students to eight highly important cybersecurity topics (primarily taught by none cybersecurity experts). We embedded it into our critical thinking Common Course (core curriculum) which…
Descriptors: College Freshmen, Computer Security, Critical Thinking, Core Curriculum
Frontera, Paul J.; Rodriguez-Seda, Erick J. – IEEE Transactions on Education, 2021
Contribution: This article presents a project-based learning (PBL) activity for use in the instruction of network attacks on cyber-physical systems. Student learning is analyzed to determine the project's contribution to learning outcome attainment. Background: The literature contains a significant amount of research on the benefits of PBL as a…
Descriptors: Student Projects, Teaching Methods, Computer Security, Information Security
Project Tomorrow, 2021
Project Tomorrow's® annual Speak Up Research Project has documented the evolution of technology use, both from an instructional and operational perspective, within K-12 education since 2003. Since 2017, the Speak Up results have also included a focus on K-12 districts' cybersecurity preparations. However, today, the combination of the expansion of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Matthew L. McFadden – ProQuest LLC, 2021
Identifying and cultivating cybersecurity leaders is paramount to building and strengthening the cybersecurity workforce. These skilled cybersecurity leaders are critical for leading effective cybersecurity teams and defending organizations against ever-increasing cyber threats. This research study analyzed cybersecurity professionals' preparation…
Descriptors: Internet, Computer Security, Leadership Training, Professional Personnel
Jirong Yi – ProQuest LLC, 2021
We are currently in a century of data where massive amount of data are collected and processed every day, and machine learning plays a critical role in automatically processing the data and mining useful information from it for making decisions. Despite the wide and successful applications of machine learning in different fields, the robustness of…
Descriptors: Artificial Intelligence, Algorithms, Data, Classification
David Javier-Aliaga; Oscar Rubén Silva Neyra; Yaquelin E. Calizaya-Milla; Jacksaint Saintila – Contemporary Educational Technology, 2024
The objective of this study is to determine the relationship between academic self-efficacy and digital competence in a sample of undergraduate university students in Peru. The design was nonexperimental, cross-sectional, and correlational. The non-probabilistic sample consisted of 98 students from a private university in Peru. Academic…
Descriptors: Self Efficacy, Competence, Digital Literacy, Undergraduate Students
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Office of Educational Technology, US Department of Education, 2024
Today and in the future, a growing array of Artificial Intelligence (AI) models and capabilities will be incorporated into the products that specifically serve educational settings. The U.S. Department of Education (Department) is committed to encouraging innovative advances in educational technology (edtech) to improve teaching and learning…
Descriptors: Artificial Intelligence, Computer Uses in Education, Educational Technology, Ethics
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Saah Agyemang-Badu; Felisa Tibbitts; Sage Phillips – Current Issues in Comparative Education, 2024
The treatment of artificial intelligence (AI) in the field of education has so far been typically characterized by (a) information about how AI can assist educators in carrying out their work, and (b) concerns about the misuse of AI by learners, for example, concerning plagiarism. The links between AI and ethics within the field of education are…
Descriptors: Artificial Intelligence, Elementary Secondary Education, Higher Education, Ethics
Leonardo Gallego Joya; Martha Andrea Merchán Merchán; Ellie Anne López Barrera – Contemporary Educational Technology, 2025
The systematic review permitted the characterization of training programs in digital teaching competence using an analysis of their structure, implementation, and results. A comprehensive search was conducted across five databases, namely Scopus, Web of Science, Redalyc, Science Direct, and LENS, to retrieve scientific articles published between…
Descriptors: Teacher Competencies, Technological Literacy, Teacher Motivation, Teacher Education Programs
Moorefield-Lang, Heather – Knowledge Quest, 2020
Digital citizenship is defined as the responsible and appropriate behavior in technology and online use. This behavior can also include digital or online etiquette, ethics, and security. With online bullying and cyber safety a continuous concern, teaching students to be responsible and aware digital citizens is imperative (Phillips and Lee 2019).…
Descriptors: Computer Use, Internet, Social Behavior, Death
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
State Educational Technology Directors Association, 2022
Many districts struggle to access the cybersecurity expertise or other resources needed to secure their networks and data appropriately. This isn't because mitigation strategies don't exist. Often, the barrage of suggestions and warnings directed at school IT leaders are too overwhelming to navigate, are not properly scoped for educational…
Descriptors: Computer Security, Information Security, Privacy, Elementary Secondary Education