Publication Date
In 2025 | 4 |
Since 2024 | 29 |
Since 2021 (last 5 years) | 95 |
Since 2016 (last 10 years) | 229 |
Since 2006 (last 20 years) | 358 |
Descriptor
Source
Author
Kruck, S. E. | 3 |
Clark, Ulku | 2 |
Clouse, Shawn | 2 |
Erway, Ricky | 2 |
Grajek, Susan | 2 |
Grama, Joanna Lyn | 2 |
Kingsley, Chris | 2 |
Ladwig, Christine | 2 |
Lawrence, Cameron | 2 |
Marquardson, Jim | 2 |
McDermott, Maureen | 2 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 24 |
Teachers | 18 |
Administrators | 6 |
Parents | 5 |
Media Staff | 3 |
Practitioners | 3 |
Community | 1 |
Students | 1 |
Support Staff | 1 |
Location
Florida | 13 |
California | 12 |
Maryland | 10 |
New York | 9 |
Virginia | 9 |
Indiana | 8 |
Kentucky | 8 |
Massachusetts | 8 |
Canada | 7 |
Texas | 7 |
United Kingdom | 7 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
Florida Comprehensive… | 1 |
SAT (College Admission Test) | 1 |
Test of Adult Basic Education | 1 |
Test of English as a Foreign… | 1 |
What Works Clearinghouse Rating
Nicole Taylor; Angela VandenBroek – Field Methods, 2025
Penciling, a technique used to anonymize images for both human and machine vision, offers an opportunity to reduce technical traceability and retain visual data for online and social media research contexts. Drawing on methods for creating composite narrative and visual accounts to preserve participant anonymity, penciling enables researchers to…
Descriptors: Social Media, Visual Aids, Data Collection, Privacy
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Young, Jacob A.; Farshadkhah, Sahar – Journal of Information Systems Education, 2023
In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their…
Descriptors: Information Security, Class Activities, Computer Science Education, Social Psychology
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Luse, Andy; Shadbad, Forough Nasirpouri – Journal of Information Systems Education, 2023
The demand for qualified analytics professionals remains high with forecasts showing a continued need over the next few years. While this demand necessitates instruction in analytics in the classroom, many students find analytics concepts to be complicated and boring. This teaching brief describes a novel approach to teaching analytics through…
Descriptors: Computer Science Education, Information Security, Learning Activities, Learner Engagement
Galende-Domínguez, Inés; Rivero-Lezcano, Octavio M. – Research Ethics, 2023
Progress in precision medicine is being achieved through the design of clinical trials that use genetic biomarkers to guide stratification of patients and assignation to treatment or control groups. Genetic analysis of biomarkers is, therefore, essential to complete their objectives, and this involves the study of biological samples from donor…
Descriptors: Genetics, Medical Research, Patients, Ethics
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2023
Safe, secure, resilient, and accessible education system infrastructure, both physical and digital, is an essential factor for success. Yet, the digital infrastructure in the nation's K-12 schools is increasingly under threat from malicious cyber actors. This fact sheet: (1) describes the most common types of cyber threats currently facing school…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Prevention
Garg, Anuj; A., Sharmila; Kumar, Pramod; Madhukar, Mani; Loyola-González, Octavio; Kumar, Manoj – Education and Information Technologies, 2022
Nowadays, internet technology plays a vital role in all the fields of our daily lives ranging from the world economy, professional careers, higher education, and almost all the spheres that are deeply impacted. In the current situation, due to COVID-19, the dependence on the Internet for almost everything, including learning, getting daily needs,…
Descriptors: Internet, Electronic Learning, Online Courses, Educational Quality
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)