Publication Date
In 2025 | 20 |
Since 2024 | 156 |
Since 2021 (last 5 years) | 416 |
Since 2016 (last 10 years) | 640 |
Since 2006 (last 20 years) | 1218 |
Descriptor
Computer Security | 1585 |
Internet | 467 |
Information Security | 441 |
Information Technology | 430 |
Foreign Countries | 268 |
Privacy | 266 |
Computer Software | 263 |
Computer Networks | 247 |
Higher Education | 243 |
Educational Technology | 219 |
Computer Science Education | 199 |
More ▼ |
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment
Amy Esther Kuiken – ProQuest LLC, 2024
The cybersecurity landscape in the United States has rapidly evolved, marked by risk and novel threats (Georgescu, 2021; Siraj et al., 2021). Today, security mindsets are "widely accepted in the computer security community as … essential … for successful cybersecurity practice" (Peterson, 2021, para. 1), valuable to aspiring…
Descriptors: Second Language Learning, Second Language Instruction, Information Security, Computer Security
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Esra Pinar Uça Günes; Nuray Gedik; Mehmet Ali Isikoglu; Baris Yigit; Ihsan Günes; Ayfer Beylik – Open Praxis, 2024
The primary objective of this manuscript is to examine the online assessment and exam security procedures during the pandemic, with a particular focus on higher education. In this context, the study investigates the measures employed by instructors, the challenges they encountered, and the strategies they employed to overcome these challenges in a…
Descriptors: Tests, Distance Education, Supervision, COVID-19
Hari Prasad Challa – ProQuest LLC, 2024
The increasing complexity of modern power systems, coupled with the integration of diverse rapidly evolving technologies involving physical systems requiring cybersecurity, has presented significant challenges for engineers in the field and researchers in laboratory facilities. This research and dissertation presents the development of a…
Descriptors: Computer Security, Information Systems, Technology Integration, Information Technology
Jenay Robert; Nicole Muscanell; Nichole Arbino; Mark McCormack; Jamie Reeves – EDUCAUSE, 2024
This report profiles the trends and key technologies and practices shaping the future of cybersecurity and privacy, and envisions a number of scenarios for that future. It is based on the perspectives and expertise of a global panel of leaders from across the higher education landscape. These are, in many ways, tumultuous times. Global political…
Descriptors: Information Security, Computer Security, Privacy, Higher Education
Vekaria, Komal Bhupendra; Calyam, Prasad; Wang, Songjie; Payyavula, Ramya; Rockey, Matthew; Ahmed, Nafis – IEEE Transactions on Learning Technologies, 2021
There is an increasing trend in cloud adoption of enterprise applications in, for example, manufacturing, healthcare, and finance. Such applications are routinely subject to targeted cyberattacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to…
Descriptors: Computer Security, Training, Crime Prevention, Information Technology
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Jermaine Jewel Jean-Pierre – ProQuest LLC, 2021
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of user awareness and knowledge of cybersecurity has been considered a contributing factor to the increase in cyberattacks and cyberthreats. The purpose of this quantitative experimental study was to explore the role and effectiveness of employee…
Descriptors: Knowledge Level, Computer Security, Training, Foreign Countries
Lee, Heesuk – ProQuest LLC, 2022
Many organizations are providing employee training to raise security awareness as data breaches increase. Organizational digital transformation has accelerated, especially during the COVID-19 outbreak. It has made the technology industry a prime target for cyberattacks. Although more organizations invest in cybersecurity training, data breaches…
Descriptors: Information Technology, Information Security, Employee Attitudes, Knowledge Level
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Raju, Rajeswari; Abd Rahman, Nur Hidayah; Ahmad, Atif – Asian Journal of University Education, 2022
As COVID-19 took hold, online learning became the norm as universities and classrooms worldwide were forced to close their doors. Education institute closures impacted more than 1.2 billion students across 186 countries as of April 2020. This pandemic, too, has shifted our Malaysian education sector as well. Academicians and students are adopting…
Descriptors: Foreign Countries, Computer Security, Knowledge Level, College Students
Shapna Sultana Pal – ProQuest LLC, 2022
Educators of graduate cybersecurity education lack decision methodologies to aid in selecting and prioritizing cybersecurity criteria and tools to provide hands-on learning in cyber courses. Educators are challenged with keeping the cybersecurity tools in the education curriculum relevant and updated. The risk of not doing so, is possibly…
Descriptors: Computer Security, Information Security, Computer Science Education, Decision Making
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes