Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 8 |
Information Technology | 8 |
Interdisciplinary Approach | 8 |
Student Attitudes | 4 |
Educational Technology | 3 |
Electronic Publishing | 3 |
Foreign Countries | 3 |
Higher Education | 3 |
Models | 3 |
Web Sites | 3 |
Academic Persistence | 2 |
More ▼ |
Source
Author
Anna E. Kosloski | 1 |
Baijian Yang | 1 |
Caroline Sutton Chubb | 1 |
Conley-Ware, Lakita D. | 1 |
Daniel Olson | 1 |
Gihan J. Mendis | 1 |
He, Wu | 1 |
Jackowicz, Stephen, Ed. | 1 |
Jin Wei-Kocsis | 1 |
Kate Quintana | 1 |
Moein Sabounchi | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Books | 2 |
Collected Works - Proceedings | 2 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Collected Works - General | 1 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Adult Education | 1 |
Early Childhood Education | 1 |
Grade 1 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Practitioners | 1 |
Researchers | 1 |
Location
Pennsylvania | 2 |
Philippines | 2 |
Portugal | 2 |
United States | 2 |
Albania | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
China | 1 |
Connecticut | 1 |
Croatia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Kate Quintana; Caroline Sutton Chubb; Daniel Olson; Anna E. Kosloski – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has become increasingly important not only in the technology sector but in criminal justice professions as well, and significant challenges have arisen as a result. However, these challenges are not well discussed in the literature. To address this gap, and to study the cybersecurity trends impacting criminal justice professionals…
Descriptors: Computer Security, Knowledge Level, Criminal Law, Role Theory
Payne, Brian K.; He, Wu; Wang, Cong; Wittkower, D. E.; Wu, Hongyi – Journal of Information Systems Education, 2021
This paper describes an interdisciplinary effort involving faculty from five different disciplines who came together to develop an interdisciplinary, open, general education cybersecurity course. The course, Cybersecurity, Technology, and Society, brings together ideas from interdisciplinary studies, information technology, engineering, business,…
Descriptors: Computer Security, Interdisciplinary Approach, Curriculum Development, General Education
Conley-Ware, Lakita D. – ProQuest LLC, 2010
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Descriptors: Crime, Terrorism, Identification, Computer Security
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers