Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Security | 11 |
Computer Software | 11 |
Identification | 11 |
Computer Science Education | 4 |
Crime | 4 |
Teaching Methods | 4 |
Accuracy | 3 |
Computer Networks | 3 |
Higher Education | 3 |
Information Security | 3 |
Information Technology | 3 |
More ▼ |
Source
Journal of Cybersecurity… | 3 |
ProQuest LLC | 3 |
Arab World English Journal | 1 |
Campus Technology | 1 |
EDUCAUSE Review | 1 |
International Association for… | 1 |
Journal of Educational Data… | 1 |
Author
Alsager, Haroon Nasser | 1 |
Aruta, John A. | 1 |
Carlos Novo | 1 |
Edwards, John | 1 |
Enfinger, Kerry Wayne | 1 |
Hart, Kaden | 1 |
James McGibney | 1 |
Mbaziira, Alex Vincent | 1 |
Morooney, Kevin | 1 |
Rolando Martins | 1 |
Rui Pinto | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 4 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 4 |
Elementary Secondary Education | 2 |
Postsecondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
High Schools | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Secondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Aruta, John A.; Schembari, N. Paul – Journal of Cybersecurity Education, Research and Practice, 2020
We describe the results of a master's thesis in malware detection and discuss the connection to the learning goals of the project. As part of the thesis, we studied obfuscation of malware, conversion of files into images, image processing, and machine learning, a process of benefit to both the student and faculty. Malware detection becomes…
Descriptors: Computer Software, Computer Security, Identification, Deception
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Alsager, Haroon Nasser – Arab World English Journal, 2020
Numerous studies have been concerned with developing new authorship recognition systems to address the increasing rates of cybercrimes associated with the anonymous nature of social media platforms, which still offer the opportunity for the users not to reveal their true identities. Nevertheless, it is still challenging to identify the real…
Descriptors: Social Media, Semitic Languages, Authors, Computer Security
Enfinger, Kerry Wayne – ProQuest LLC, 2016
The number of malicious files present in the public domain continues to rise at a substantial rate. Current anti-malware software utilizes a signature-based method to detect the presence of malicious software. Generating these pattern signatures is time consuming due to malicious code complexity and the need for expert analysis, however, by making…
Descriptors: Artificial Intelligence, Computer Software, Identification, Computer Security
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Suess, Jack; Morooney, Kevin – EDUCAUSE Review, 2009
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
Descriptors: Higher Education, Internet, Computer Software, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers