Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 5 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Security | 5 |
| Difficulty Level | 5 |
| Information Security | 5 |
| Barriers | 2 |
| Computer Science Education | 2 |
| Relevance (Education) | 2 |
| Teaching Methods | 2 |
| Undergraduate Students | 2 |
| Affective Behavior | 1 |
| After School Programs | 1 |
| Animation | 1 |
| More ▼ | |
Source
| Assessment & Evaluation in… | 1 |
| IEEE Transactions on Education | 1 |
| Journal of Online Learning… | 1 |
| ProQuest LLC | 1 |
| Smart Learning Environments | 1 |
Author
| Antonenko, Pavlo | 1 |
| Becker, Benjamin | 1 |
| Connor David Nelson | 1 |
| Dawson, Kara | 1 |
| DeLatte, David | 1 |
| Debeer, Dries | 1 |
| Herman, Geoffrey L. | 1 |
| Koh, Do Hyong | 1 |
| Leow, Meng Chew | 1 |
| Liew, Tze Wei | 1 |
| Molenaar, Dylan | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Dissertations/Theses -… | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Grade 3 | 1 |
| Grade 4 | 1 |
| Grade 5 | 1 |
| Intermediate Grades | 1 |
| Middle Schools | 1 |
| Primary Education | 1 |
Audience
Location
| Asia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Item Order and Speededness: Implications for Test Fairness in Higher Educational High-Stakes Testing
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Liew, Tze Wei; Pang, Wei Ming; Leow, Meng Chew; Tan, Su-Mae – Smart Learning Environments, 2022
Emotional design refers to imbuing a multimedia learning environment with design attributes that promote learners' positive affect and motivation to enhance learning. One such feature is anthropomorphism, in which human-like attributes are infused into learning elements in a multimedia learning environment. This study examines the affective,…
Descriptors: Multimedia Instruction, Instructional Design, Multimedia Materials, Human Body
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Parekh, Geet; DeLatte, David; Herman, Geoffrey L.; Oliva, Linda; Phatak, Dhananjay; Scheponik, Travis; Sherman, Alan T. – IEEE Transactions on Education, 2018
This paper presents and analyzes results of two Delphi processes that polled cybersecurity experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These ratings can be used to identify core concepts--cross-cutting ideas that connect knowledge in the discipline. The first Delphi process identified core concepts that…
Descriptors: Delphi Technique, Specialists, Fundamental Concepts, Computer Security

Direct link
Peer reviewed
