Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 11 |
Since 2016 (last 10 years) | 26 |
Since 2006 (last 20 years) | 32 |
Descriptor
Source
Author
Lawrence, Cameron | 2 |
Ormiston, Meg | 2 |
Young, Jacob A. | 2 |
Adams, Lascelles | 1 |
Ahlgrim-Delzell, Lynn | 1 |
Amy J. Connolly | 1 |
Bacak, Julie | 1 |
Becker, Jonathan D. | 1 |
Blake, Lissa | 1 |
Brooks, D. Christopher | 1 |
Byker, Erik Jon | 1 |
More ▼ |
Publication Type
Journal Articles | 21 |
Reports - Descriptive | 18 |
Guides - Classroom - Teacher | 6 |
Books | 5 |
Tests/Questionnaires | 5 |
Reports - Research | 4 |
Collected Works - General | 3 |
Guides - Non-Classroom | 3 |
Reports - Evaluative | 2 |
Education Level
Higher Education | 13 |
Postsecondary Education | 13 |
Elementary Secondary Education | 5 |
Elementary Education | 2 |
Secondary Education | 2 |
Early Childhood Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Primary Education | 1 |
Audience
Teachers | 32 |
Administrators | 6 |
Policymakers | 3 |
Researchers | 3 |
Parents | 2 |
Students | 2 |
Support Staff | 1 |
Location
New York | 1 |
Oregon | 1 |
Pennsylvania | 1 |
Tennessee (Nashville) | 1 |
Uganda | 1 |
West Virginia | 1 |
Wisconsin (Milwaukee) | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Individuals with Disabilities… | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Young, Jacob A.; Farshadkhah, Sahar – Journal of Information Systems Education, 2023
In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their…
Descriptors: Information Security, Class Activities, Computer Science Education, Social Psychology
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Luse, Andy; Shadbad, Forough Nasirpouri – Journal of Information Systems Education, 2023
The demand for qualified analytics professionals remains high with forecasts showing a continued need over the next few years. While this demand necessitates instruction in analytics in the classroom, many students find analytics concepts to be complicated and boring. This teaching brief describes a novel approach to teaching analytics through…
Descriptors: Computer Science Education, Information Security, Learning Activities, Learner Engagement
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Rusen Meylani – International Journal of Research in Education and Science, 2024
This review explores the integration and effects of the Internet of Things (IoT) in education, highlighting its importance in transforming traditional teaching and learning techniques. It examines the early uses and historical growth of IoT, its development, and the turning points in its adoption. It explores IoT platforms, tools, and technologies…
Descriptors: Internet, Equipment, Educational Environment, Technology Uses in Education
Becker, Jonathan D.; Levin, Douglas A. – Journal of Cases in Educational Leadership, 2020
School systems collect and maintain increasingly significant amounts of data and information on students, faculty, and staff and have a duty of care to ensure that sensitive information remains secure. Therefore, sitting and/or aspiring school leaders need to develop at least a basic understanding of data privacy and information security…
Descriptors: Information Security, School Policy, Policy Formation, Privacy
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
National Forum on Education Statistics, 2021
The "Forum Guide to Metadata" presents and examines the ways in which metadata can be used by education agencies to improve data quality and promote a better understanding of education data. Supported by metadata-related case studies from state and local education agencies, the guide highlights the uses of metadata from a technical point…
Descriptors: Metadata, Information Management, Data Collection, Data Use
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Zimmerle, Joanna C.; Wall, Anne S. – Computers in the Schools, 2019
Although the Children's Online Privacy Protection Act (COPPA) was enacted 20 years ago, the recently updated General Data Protection Regulation (GDPR) has renewed public interest in privacy policies. Under both COPPA and GDPR, companies must abide by strict regulations protecting children's personal data. Lengthy and oftentimes ambiguous policies…
Descriptors: Privacy, Computer Security, Computer Oriented Programs, Web Sites
Ladwig, Christine; Schwieger, Dana; Clayton, Donald – Information Systems Education Journal, 2017
The "Piranha Solution"® is a complex and valuable integrated chemical supply inventory management system protected as a trade secret by its asset holder, the Confluence Corporation. The "Piranha" program is the lifeblood of the corporation's growth and success in the chemical supply industry. A common definition of "trade…
Descriptors: Information Systems, Information Security, Management Systems, Knowledge Management
Spears, Janine L. – Journal of Information Systems Education, 2018
Students need real-world experience. Industry needs graduating students entering the workforce to be skilled in relevant subject matter, critical thinking, and communication skills. Community-based nonprofit organizations, as well as small businesses, need help in building organizational capacity. Instructors also benefit from periodic observation…
Descriptors: Information Security, Service Learning, Relevance (Education), Capacity Building