Publication Date
In 2025 | 20 |
Since 2024 | 156 |
Since 2021 (last 5 years) | 416 |
Since 2016 (last 10 years) | 640 |
Since 2006 (last 20 years) | 1218 |
Descriptor
Computer Security | 1585 |
Internet | 467 |
Information Security | 441 |
Information Technology | 430 |
Foreign Countries | 268 |
Privacy | 266 |
Computer Software | 263 |
Computer Networks | 247 |
Higher Education | 243 |
Educational Technology | 219 |
Computer Science Education | 199 |
More ▼ |
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Andrew Hamilton – ProQuest LLC, 2022
The purpose of this study was to explore the experiences and motivational factors that influenced educational and career decisions of United States military veterans who transitioned out of the military and into an information technology (IT)-related career field. The study investigated the reasons veterans decided to pursue IT-related careers,…
Descriptors: Guided Pathways, Veterans, Military Personnel, Transitional Programs
Karst, Nathaniel; Slegers, Rosa – PRIMUS, 2019
Many of the applied mathematics courses we teach touch upon a range of rich and important ethical issues -- issues that, for a number of reasons, are rarely openly discussed in class. In this work, we describe a sequence of activities co-designed and co-taught by philosophy and mathematics faculty in the hopes of bridging the divide between the…
Descriptors: Team Teaching, Ethics, Mathematics Instruction, Technology
Canfield, Casey Inez; Fischhoff, Baruch; Davis, Alex – Metacognition and Learning, 2019
Every electronic message poses some threat of being a phishing attack. If recipients underestimate that threat, they expose themselves, and those connected to them, to identity theft, ransom, malware, or worse. If recipients overestimate that threat, then they incur needless costs, perhaps reducing their willingness and ability to respond over…
Descriptors: Deception, Electronic Mail, Metacognition, Self Esteem
Williams-Banta, Pauline Elaine – ProQuest LLC, 2019
There is increasing competitive pressure on organizations as they battle frequent, costly, and complex cyber-attacks that seek to undermine the security, and availability of their computing systems. The problem is that people are said to be the weakest link in the security chain, so companies have made significant investments to safeguard their…
Descriptors: Computer Security, Training, Information Security, Knowledge Level
Jason H. Sharp; John E. Anderson; Guido Lang – Information Systems Education Journal, 2025
The "Information Systems Education Journal" has published uninterrupted since 2003. Over its publication history, it has covered myriad topics related to information systems education including model curriculum, outcomes assessment, online learning, capstone courses, service learning, data analytics, and cybersecurity, just to name a…
Descriptors: Information Systems, Computer Science Education, Educational Research, Bibliometrics
Hans Kaushik; Smriti Kaushik – Education and Information Technologies, 2024
The involvement of technology in the education domain has transformed the traditional system in many countries. The need was realized when 300 million students in India itself were pushed to move from traditional to various digital education platforms during the pandemic. There has been an essential emphasis given to the promotion of digital based…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Technology Uses in Education
Peter Draus; Sushma Mishra; Kevin Slonka; Natalya Bromall – Information Systems Education Journal, 2024
There is a significant skill gap, with millions of cybersecurity jobs still needing to be fulfilled due to a lack of a trained workforce. Various academic programs are available that teach students in different aspects of cybersecurity. This paper investigates if the title of an IT program has any impact on the desirability of a program and if…
Descriptors: College Students, Information Technology, Information Security, Cybernetics
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Ahmed Al Zaidy – ProQuest LLC, 2020
Academic institutions hold important information about students, faculty, and staff members. Hackers target academic institutions to access this information for criminal activities such as identity theft. This study was conducted to examine information confidentiality and cybersecurity in academic institutions. It targeted employees' training…
Descriptors: Confidentiality, Information Security, Computer Security, Employees
Cusak, Austin – Journal of Cybersecurity Education, Research and Practice, 2023
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a…
Descriptors: Internet, Computer Security, Information Security, Labor Force Development
Llorens, Ariadna; Prat, Joana; Pažur Anicic, Katarina – European Journal of Engineering Education, 2023
This paper analyses the effect that the fulfilment of the European Higher Education Area (EHEA) has got among engineers in the information and communication technologies (ICT) sector. The focus is on Spain, and the comparison of the technical and managerial knowledge and skills most demanded by the sector in 2008 and 2018, coinciding with the…
Descriptors: Foreign Countries, Information Technology, Employer Attitudes, Higher Education
Lobzhanidze, Sofiko; Urchukhishvili, Giorgi; Sikharulidze, Marika – Problems of Education in the 21st Century, 2023
The Council of Europe's (CoE) model on Digital Citizenship Education (DCE) has at its basis the 'Competencies of Democratic Culture' model, which considers being an active and responsible citizen and implies the development of a set of lifelong competencies both online and offline at various levels, as well. Taking the 'Competencies of Democratic…
Descriptors: Technological Literacy, Foreign Countries, Elementary Secondary Education, Educational Technology
Emmanuel Wansi – ProQuest LLC, 2023
Shortages within the cybersecurity workforce are not new; fluctuations in supply and demand, fiscal and monetary constraints, and technological advances have influenced changes within the cybersecurity workforce nationally and globally. Cloud computing and the Internet of Things (IoT) impact many different cybersecurity roles within different…
Descriptors: Evaluation, Internet, Computer Security, Information Security
Ibrahim, Ahmed; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2021
DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for…
Descriptors: Information Security, Computer Security, Educational Resources, Active Learning