Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Security | 10 |
Crime | 10 |
Teaching Methods | 10 |
Information Security | 7 |
Prevention | 4 |
Computer Science Education | 3 |
Course Content | 3 |
Deception | 3 |
Handheld Devices | 3 |
Information Technology | 3 |
Telecommunications | 3 |
More ▼ |
Source
Journal of Cybersecurity… | 4 |
ProQuest LLC | 3 |
Information Systems Education… | 1 |
International Association for… | 1 |
Author
Belshaw, Scott H. | 2 |
A. Renee Staton | 1 |
Chou, Te-Shun | 1 |
Colaiuta, Alexandrea | 1 |
Dawn C. Tatum | 1 |
Hempenius, Nicholas | 1 |
Isaías, Pedro, Ed. | 1 |
James McGibney | 1 |
Ladwig, Christine | 1 |
Laurel Lynn Schneider | 1 |
Michele Kielty | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Guides - Classroom - Learner | 1 |
Guides - Classroom - Teacher | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Education | 3 |
Early Childhood Education | 2 |
Elementary Secondary Education | 2 |
Kindergarten | 2 |
Primary Education | 2 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 1 |
Students | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Sánchez, Inmaculada Arnedillo, Ed.; Isaías, Pedro, Ed. – International Association for Development of the Information Society, 2014
These proceedings contain the papers of the 10th International Conference on Mobile Learning 2014, which was organised by the International Association for Development of the Information Society, in Madrid, Spain, February 28-March 2, 2014. The Mobile Learning 2014 International Conference seeks to provide a forum for the presentation and…
Descriptors: Conference Papers, Telecommunications, Handheld Devices, Technology Uses in Education
Internal Revenue Service (Dept. of Treasury), Washington, DC. – 1994
This packet contains a textbook, an instructor's guide, and a student workbook for a course on conducting financial investigations to detect and solve crimes. The topics covered in the 11 chapters of the textbook and the ancillaries are the following: (1) why financial investigation?; (2) laws related to financial crimes; (3) evidence; (4) sources…
Descriptors: Banking, Classroom Techniques, Computer Security, Course Content