Publication Date
In 2025 | 1 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 13 |
Descriptor
Computer Science Education | 13 |
Computer Security | 13 |
Ethics | 13 |
Information Security | 8 |
Computer Networks | 4 |
Foreign Countries | 4 |
Information Technology | 4 |
Computer Software | 3 |
Curriculum Development | 3 |
High School Students | 3 |
Internet | 3 |
More ▼ |
Source
Author
Adil Jeghal | 1 |
Ali Yahyaouy | 1 |
Bhunia, Swarup | 1 |
Brandi Robinson | 1 |
Clouse, Shawn | 1 |
Eric Eskelsen | 1 |
Fulton, Eric | 1 |
Hajar Majjate | 1 |
Hamid Tairi | 1 |
Ibrahim, Walid | 1 |
Jens Myrup Pedersen | 1 |
More ▼ |
Publication Type
Journal Articles | 12 |
Reports - Research | 9 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
High Schools | 3 |
Secondary Education | 3 |
Elementary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Eric Eskelsen – ProQuest LLC, 2024
Engineers have developed innovative hardware solutions to treat various medical conditions that provide medical patients with better health outcomes. These devices can be found in hospitals, medical clinics, homes, and even implanted in individuals. The patients experience freedom from extended hospital stays and can spend time with their family…
Descriptors: Computer Security, Medical Services, Computer Science Education, Health Personnel
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Tekerek, Mehmet; Tekerek, Adem – Online Submission, 2013
In this study, elementary and high school students' information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaras City, towns, small towns and villages of Kahramanmaras province.…
Descriptors: Foreign Countries, Elementary School Students, High School Students, Knowledge Level
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews