Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Literacy | 3 |
Computer Security | 3 |
Crime | 3 |
Information Security | 3 |
Computer Software | 2 |
Computer Science Education | 1 |
Curriculum Design | 1 |
Elementary Secondary Education | 1 |
Employees | 1 |
Error Patterns | 1 |
Ethics | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Early Childhood Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Higher Education | 1 |
Kindergarten | 1 |
Postsecondary Education | 1 |
Primary Education | 1 |
Audience
Location
India | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy