Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Elementary Secondary Education | 3 |
Technology | 3 |
Computer Networks | 2 |
Information Security | 2 |
Accountability | 1 |
Artificial Intelligence | 1 |
Class Activities | 1 |
Community Programs | 1 |
Comparative Analysis | 1 |
Copyrights | 1 |
More ▼ |
Author
Brown, Joan Marie | 1 |
Evmorfia-Iro Bartzia | 1 |
Marco Sbaraglia | 1 |
Michael Lodi | 1 |
Simon Modeste | 1 |
Simone Martini | 1 |
Viviane Durand-Guerrier | 1 |
Wang, Jianjun | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Guides - Classroom - Teacher | 1 |
Tests/Questionnaires | 1 |
Education Level
Elementary Secondary Education | 2 |
Higher Education | 2 |
Postsecondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
High Schools | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Secondary Education | 1 |
Audience
Location
California | 1 |
Europe | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Brown, Joan Marie – Learning & Leading with Technology, 1997
Describes four open-ended activities for students in grades 4-12 designed to encourage thought, discussion, and decision making in classes dealing with issues in ethics and technology. Provides teacher directions, describes activities, and outlines debriefing sessions for lessons in copyright infringement, network security, artificial…
Descriptors: Artificial Intelligence, Class Activities, Computer Networks, Computer Security