NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 162 results Save | Export
Jeremy Jon Bro – ProQuest LLC, 2023
Secure Code Education (SCE) is the compliance requirement for many organizations in the U.S. Consequently, many U.S. companies spend large sums on programs and tooling to meet this requirement and to upskill their developers. This tooling is largely underutilized. Classes beyond the bare required minimum are often not taken advantage of, leaving…
Descriptors: Coding, Gamification, Vignettes, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Patricia M. Sheridan; Marc Waldman – Journal of Legal Studies Education, 2024
Today's college students increasingly rely on technology in their daily activities, and a basic awareness of data privacy is becoming essential from both a personal and professional standpoint. This article describes the design of an interdisciplinary undergraduate course focused on data privacy law. It outlines the key content areas that…
Descriptors: Curriculum Design, Data, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Thulasi M. Santhi; K. Srinivasan – IEEE Transactions on Learning Technologies, 2024
Cloud adoption in industrial sectors, such as process, manufacturing, health care, and finance, is steadily rising, but as it grows, the risk of targeted cyberattacks has increased. Hence, effectively defending against such attacks necessitates skilled cybersecurity professionals. Traditional human-based cyber-physical education is resource…
Descriptors: Artificial Intelligence, Information Security, Computer Security, Prevention
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Jane Henriksen-Bulmer; Emily Rosenorn-Lanng; Stevie Corbin-Clarke; Samuel Ware; Davide Melacca; Lee-Ann Fenge – Interactive Learning Environments, 2024
Game-based learning can be a useful tool for increasing engagement in topics that are typically not related to games such as privacy and staying safe online, yet, very few games exist that look at how we can passively teach audiences how to stay safe online. This paper presents a bespoke board game about privacy, aimed at young people aged 16-25…
Descriptors: Game Based Learning, Teaching Methods, Privacy, Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Lisa Bosman; Taofeek Oladepo; Ida Ngambeki – Journal of Research in Innovative Teaching & Learning, 2024
Purpose: Upon graduating from university, many engineers will work in new product development and/or technology adoption for continuous improvement and production optimization. These jobs require employees to be cognizant of ethical practices and implications for design. However, little engineering coursework, outside the traditional ABET…
Descriptors: Engineering Education, Ethics, Data, Information Security
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Peer reviewed Peer reviewed
Direct linkDirect link
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Frontera, Paul J.; Rodriguez-Seda, Erick J. – IEEE Transactions on Education, 2021
Contribution: This article presents a project-based learning (PBL) activity for use in the instruction of network attacks on cyber-physical systems. Student learning is analyzed to determine the project's contribution to learning outcome attainment. Background: The literature contains a significant amount of research on the benefits of PBL as a…
Descriptors: Student Projects, Teaching Methods, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Laura Czerniewicz; Jennifer Feldman – Learning, Media and Technology, 2024
The pressure towards digital education is felt everywhere including in places with extreme digital divides. Resource-constrained educational environments are particularly threatened by datification manifest in the dominant business models of surveillance capitalism as there is less room in such contexts to refuse the 'free' offerings from big tech…
Descriptors: Foreign Countries, Teaching Methods, Teacher Attitudes, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Yun Du – International Journal of Web-Based Learning and Teaching Technologies, 2024
This paper deeply discusses the transformation potential of integrating Internet big data into the pre-school education model in colleges and universities. Through in-depth analysis, we studied the challenges and opportunities faced by preschool education in colleges and universities, and discussed the innovative influence of big data technology…
Descriptors: Educational Innovation, Preschool Education, Data Analysis, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Bongiovanni, Ivano – Journal of Information Systems Education, 2022
In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Australian-based company tasked with assessing the information security practices of SkillPlat, a provider of apprenticeship and traineeship services. The case develops around the one-week visit paid by Selective Consulting to SkillPlat's headquarters,…
Descriptors: Information Security, Role Playing, Teaching Methods, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Kumar, Priya C.; Byrne, Virginia L. – Information and Learning Sciences, 2022
Purpose: Existing privacy-related educational materials are not situated in privacy theory, making it hard to understand what specifically children learn about privacy. This article aims to offer learning objectives and guidance grounded in theories of privacy and learning to serve as a foundation for privacy literacy efforts.…
Descriptors: Privacy, Information Literacy, Information Security, Literacy Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11