Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 16 |
Since 2016 (last 10 years) | 24 |
Since 2006 (last 20 years) | 29 |
Descriptor
Active Learning | 29 |
Information Security | 29 |
Computer Security | 12 |
Computer Science Education | 10 |
Teaching Methods | 9 |
Computer Software | 8 |
Information Technology | 8 |
Educational Technology | 7 |
Undergraduate Students | 7 |
Student Projects | 6 |
Case Method (Teaching… | 5 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 22 |
Reports - Research | 15 |
Reports - Descriptive | 8 |
Collected Works - Proceedings | 3 |
Tests/Questionnaires | 3 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 19 |
Postsecondary Education | 16 |
High Schools | 2 |
Secondary Education | 2 |
Adult Education | 1 |
Grade 10 | 1 |
Grade 11 | 1 |
Audience
Teachers | 2 |
Location
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
Idaho | 1 |
India | 1 |
Ohio | 1 |
Pennsylvania | 1 |
Poland | 1 |
Russia | 1 |
Saudi Arabia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Whyte, Christopher – Journal of Political Science Education, 2021
This essay outlines a set of mini-games designed to more effectively allow political science instructors, particularly in International Relations, teach basic principles and concepts associated with digital insecurity and cyber conflict. This topic, increasingly significant in IR syllabi in recent years, is in many cases considered with…
Descriptors: Game Based Learning, Political Science, Information Security, Active Learning
Gao, Guandong; Xiao, Ke; Jia, Yuchen; Wang, Huaying – Innovations in Education and Teaching International, 2022
To improve the practical effect of an information system security course for students majoring in information security, a teaching method based on the theory of inventive problem solving (TIPS) that combines case-based teaching and project practice was introduced in the class. Adopting innovative thinking methods, we instructed students on the…
Descriptors: Problem Solving, Information Security, Information Science Education, Case Method (Teaching Technique)
Ibrahim, Ahmed; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2021
DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for…
Descriptors: Information Security, Computer Security, Educational Resources, Active Learning
Kim, Sang Soo – Interactive Learning Environments, 2023
As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary to explore the motivators and barriers to student engagement comprehensively. Given the nature of an online learning environment, this study specifically focused on security…
Descriptors: Online Courses, Universities, COVID-19, Pandemics
Kishor Datta Gupta – ProQuest LLC, 2021
Defenses against adversarial attacks are essential to ensure the reliability of machine learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations in practical use. I proposed a trustworthy framework that employs an adaptive strategy to inspect both inputs and decisions. In…
Descriptors: Artificial Intelligence, Cybernetics, Information Processing, Information Security
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Krutka, Daniel G. – Social Education, 2020
In the United States, people have long had a tendency to see the immediate, personal benefits of new technologies as contributing to human progress well before understanding their long-term social consequences. Facebook offers an instructive (and destructive) example. Facebook has failed to build infrastructural safeguards or accept the ethical…
Descriptors: Social Media, Social Problems, Ethics, Social Studies
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
Maxworth, Ashanthi – Advances in Engineering Education, 2021
This paper presents the implementation of a case study analysis in an introductory level electrical circuits course. According to the author's knowledge, this is the first time hybrid implementation of a case study analysis with problem-based learning (PBL) and virtual experimentation (VE) was used in an introductory level electrical circuits…
Descriptors: Engineering Education, Problem Based Learning, Feedback (Response), Introductory Courses
Kirk, Sarah; Foreman, Daniel; Lee, Cody; Beasley, Shannon W. – Journal of Cybersecurity Education, Research and Practice, 2019
The goal of this research is to describe an active learning opportunity that was conducted as a community service offering through our Center for Cybersecurity Education and Applied Research (CCEAR). As a secondary goal, the participants sought to gain real world experience by applying techniques and concepts studied in security classes. A local…
Descriptors: Active Learning, Computer Security, Information Security, Access to Information
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Previous Page | Next Page »
Pages: 1 | 2