Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Foreign Countries | 7 |
Instructional Effectiveness | 7 |
Information Technology | 4 |
Case Studies | 3 |
College Instruction | 3 |
Computer Mediated… | 3 |
Educational Technology | 3 |
Electronic Learning | 3 |
Instructional Design | 3 |
Internet | 3 |
More ▼ |
Source
British Journal of… | 1 |
Education and Information… | 1 |
Information Science Reference | 1 |
Interactive Technology and… | 1 |
International Association for… | 1 |
Journal of Computing in… | 1 |
Journal of Cybersecurity… | 1 |
Author
Bokolo, Anthony Jnr | 1 |
Campbell, Jackie | 1 |
Dipti Kapoor Sarmah | 1 |
Ioana Boureanu | 1 |
Mba, Gibson | 1 |
Michael Adorjan | 1 |
Mohana Mukherjee | 1 |
Ng, Eugenia M. W., Ed. | 1 |
Nweke, Livinus Obiora | 1 |
Nwigwe, Emeka | 1 |
Oliver J. Mason | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 5 |
Books | 1 |
Collected Works - General | 1 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Adult Education | 1 |
Secondary Education | 1 |
Audience
Practitioners | 1 |
Researchers | 1 |
Location
United Kingdom | 3 |
Pennsylvania | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Canada | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Europe | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Nweke, Livinus Obiora; Bokolo, Anthony Jnr; Mba, Gibson; Nwigwe, Emeka – Education and Information Technologies, 2022
HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the HyFlex pedagogical method to teach highly interactive digital and face-to-face cyber security training in Nigeria amidst the…
Descriptors: Computer Security, Information Security, Videoconferencing, Student Attitudes
Michael Adorjan; Rosemary Ricciardelli; Mohana Mukherjee – British Journal of Educational Studies, 2024
Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative…
Descriptors: Computer Security, Restorative Practices, Bullying, Computer Mediated Communication
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers