Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 19 |
Descriptor
Computer Security | 22 |
Information Technology | 22 |
Teaching Methods | 22 |
Information Security | 9 |
Computer Software | 8 |
Foreign Countries | 8 |
Computer Networks | 7 |
Computer Science Education | 7 |
Educational Technology | 7 |
Internet | 7 |
Higher Education | 6 |
More ▼ |
Source
Author
Smith, Peter, Ed. | 2 |
Yuan, Xiaohong | 2 |
A. Renee Staton | 1 |
Ali, Mohd Norawi | 1 |
Archer, Ricky | 1 |
Battisti, F. | 1 |
Belshaw, Scott H. | 1 |
Bhagyavati | 1 |
Boato, G. | 1 |
Burrell, Darrell Norman | 1 |
Burton, Sharon L. | 1 |
More ▼ |
Publication Type
Journal Articles | 18 |
Reports - Descriptive | 9 |
Reports - Research | 8 |
Collected Works - Proceedings | 3 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 16 |
Postsecondary Education | 10 |
Elementary Secondary Education | 3 |
Secondary Education | 3 |
Elementary Education | 2 |
Early Childhood Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
China | 2 |
Italy | 2 |
North Carolina | 2 |
United States | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Tessa Consoli – Frontline Learning Research, 2024
Based on a national survey of 8,915 students, this study examines the prevalence of different types of media education practices in Swiss upper secondary schools and their relationship with students' online civic engagement and respectful online behavior. Descriptive statistics reveal that schools place little emphasis on media education and that…
Descriptors: Media Education, Teaching Methods, Differences, Citizen Participation
Burrell, Darrell Norman; Courtney-Dattola, Ashley; Burton, Sharon L.; Nobles, Calvin; Springs, Delores; Dawson, Maurice E. – International Journal of Information and Communication Technology Education, 2020
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own…
Descriptors: Internet, Instructional Improvement, Information Technology, Computer Security
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Ravendran, Saravnesvaran; Karpudewan, Mageswary; Ali, Mohd Norawi; Lay, Yoon Fah – Malaysian Online Journal of Educational Sciences, 2023
The Fourth Industrial Revolution (4IR) refers to the current rapid technological growth that fundamentally changes how humans live. 4IR is essential to improve higher education worldwide and develop crucial skills such as e-learning and innovation, information and media technology, and life and career skills. This study aims to assess the…
Descriptors: Technological Advancement, Foreign Countries, Technological Literacy, Pedagogical Content Knowledge
Mongkonrat Chaiyadet; Pallop Piriyasurawong; Panita Wannapiroon – International Education Studies, 2024
The objective of this research is to develop and study the outcomes of developing the Ubiquitous Buddhism Learning Ecosystem for Proactive Buddhism Propagation for Digital Citizenship. The sample group used in the research consists of nine individuals selected through targeted sampling, comprising experts in the design and development of learning…
Descriptors: Buddhism, Models, Citizenship, Educational Philosophy
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Peltsverger, Svetlana; Zheng, Guangzhi – Journal of Information Technology Education: Innovations in Practice, 2016
The paper describes the development of four learning modules that focus on technical details of how a person's privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning…
Descriptors: Privacy, Information Technology, Learning Modules, Problem Based Learning
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Ramorola, M. Z. – Africa Education Review, 2013
South African teachers are faced with challenges in integrating technology effectively into a coherent framework at school level. There seems to be little evidence of technology integration into classroom activities such as systematic planning and implementation of lessons that require learners to think critically, work collaboratively, and use…
Descriptors: Teaching Methods, Technology Integration, Secondary School Teachers, Secondary School Students
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
del Moral Talabis, Mark Ryan – AACE Journal, 2007
Learning IT Security in a classroom setting has often been a frustrating endeavor for both instructors and students alike. From our experience, traditional instructional methods like direct instruction and lectures though widely used and effective in most other areas have significant shortcomings when applied in IT security learning. In this…
Descriptors: Feedback (Response), Teaching Methods, Methods, Information Technology
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Kohlmeyer, James M., III – Journal of College Teaching & Learning, 2008
While it is important for accounting information systems (AIS) students to understand computer technology, internal controls and business processes, such knowledge is of little use without reference to appropriate contexts. Integrating Wall Street Journal (WSJ) readings and discussions into AIS classes can enrich learning by stimulating…
Descriptors: Information Systems, Context Effect, Curriculum Enrichment, Case Method (Teaching Technique)
Previous Page | Next Page ยป
Pages: 1 | 2