Publication Date
In 2025 | 3 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 8 |
Foreign Countries | 8 |
Game Based Learning | 8 |
Computer Science Education | 4 |
Educational Games | 4 |
Information Security | 4 |
Teaching Methods | 4 |
Electronic Learning | 3 |
Elementary Secondary Education | 3 |
English (Second Language) | 3 |
Gamification | 3 |
More ▼ |
Source
Education and Information… | 2 |
Association for Educational… | 1 |
IEEE Transactions on Education | 1 |
Interactive Learning… | 1 |
International Association for… | 1 |
International Society for… | 1 |
Journal of Computing in… | 1 |
Author
Abu Alam | 1 |
Alex Cameron | 1 |
Alkaabi, Shamma | 1 |
Andrej Jerman Blažic | 1 |
Bo-Yang Shan | 1 |
Borka Jerman Blažic | 1 |
Dipti Kapoor Sarmah | 1 |
El Sayed, Hesham | 1 |
Isaias, Pedro, Ed. | 1 |
Jordan Allison | 1 |
Khan, Manzoor Ahmed | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 5 |
Collected Works - Proceedings | 3 |
Books | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Elementary Education | 3 |
Elementary Secondary Education | 3 |
Secondary Education | 3 |
High Schools | 2 |
Adult Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Two Year Colleges | 1 |
Audience
Location
Algeria | 1 |
Bulgaria | 1 |
China | 1 |
Europe | 1 |
European Union | 1 |
Germany | 1 |
Hungary | 1 |
India | 1 |
Indonesia | 1 |
Italy | 1 |
Jordan | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
Mack Shelley, Editor; Omer Tayfur Ozturk, Editor – International Society for Technology, Education, and Science, 2024
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on April 27-30, 2024, in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, discuss theoretical and…
Descriptors: STEM Education, Second Language Learning, Second Language Instruction, English (Second Language)
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation