Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 16 |
Since 2016 (last 10 years) | 25 |
Since 2006 (last 20 years) | 43 |
Descriptor
Computer Science Education | 48 |
Computer Security | 48 |
Information Technology | 48 |
Information Security | 22 |
Computer Software | 15 |
Internet | 13 |
Educational Technology | 11 |
Computer Networks | 10 |
Foreign Countries | 8 |
Instructional Design | 8 |
Programming | 8 |
More ▼ |
Source
Author
Cummings, Jeff | 2 |
Janicki, Thomas | 2 |
Smith, Peter, Ed. | 2 |
Abhishek Vaish | 1 |
Abu-Taieh, Evon M. | 1 |
Alluhaidan, Ala | 1 |
Alper Yayla | 1 |
Ambraziene, Danute | 1 |
Amin, Rohan Mahesh | 1 |
Amoroso, Donald | 1 |
Andrew Hamilton | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 29 |
Postsecondary Education | 25 |
Elementary Secondary Education | 4 |
Adult Education | 3 |
Elementary Education | 3 |
Secondary Education | 3 |
High Schools | 2 |
Two Year Colleges | 2 |
Audience
Policymakers | 1 |
Practitioners | 1 |
Location
Australia | 2 |
Connecticut | 2 |
Ohio | 2 |
Pennsylvania | 2 |
Turkey | 2 |
United Kingdom | 2 |
Asia | 1 |
Brazil | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
More ▼ |
Laws, Policies, & Programs
Equal Access | 1 |
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
Emeka Ejikeme – ProQuest LLC, 2023
The U.S. National Institute of Standards and Technology (NIST) identified that approximately 1.8 million cybersecurity positions were vacant in 2021 because of a lack of professionals with the required skill sets and who remained in their jobs long enough to contribute to their organizations' cybersecurity needs. Also shown was the rising global…
Descriptors: Best Practices, Computer Security, College Graduates, Computer Literacy
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Lee, Heesuk – ProQuest LLC, 2022
Many organizations are providing employee training to raise security awareness as data breaches increase. Organizational digital transformation has accelerated, especially during the COVID-19 outbreak. It has made the technology industry a prime target for cyberattacks. Although more organizations invest in cybersecurity training, data breaches…
Descriptors: Information Technology, Information Security, Employee Attitudes, Knowledge Level
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Paul Wagner; Dalal Alharthi – Journal of Cybersecurity Education, Research and Practice, 2024
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that…
Descriptors: Artificial Intelligence, Computer Simulation, Information Technology, Computer Security
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Andrew Hamilton – ProQuest LLC, 2022
The purpose of this study was to explore the experiences and motivational factors that influenced educational and career decisions of United States military veterans who transitioned out of the military and into an information technology (IT)-related career field. The study investigated the reasons veterans decided to pursue IT-related careers,…
Descriptors: Guided Pathways, Veterans, Military Personnel, Transitional Programs
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Alluhaidan, Ala; Abu-Taieh, Evon M. – International Education Studies, 2020
Abstract The rapid growth of technology and related fields has led to creation in academia to match the expansion demand for IT professionals. One of the current majors that attract attention in industry is cybersecurity. There is a great need for individuals who are skilled in cybersecurity to protect IT infrastructure. Coaching a…
Descriptors: Outcomes of Education, Computer Security, Information Technology, Computer Science Education
Burrell, Darrell Norman; Courtney-Dattola, Ashley; Burton, Sharon L.; Nobles, Calvin; Springs, Delores; Dawson, Maurice E. – International Journal of Information and Communication Technology Education, 2020
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own…
Descriptors: Internet, Instructional Improvement, Information Technology, Computer Security
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology