Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Control Groups | 2 |
| Experimental Groups | 2 |
| Internet | 2 |
| Pretests Posttests | 2 |
| Attitude Change | 1 |
| Behavior Standards | 1 |
| Citizenship | 1 |
| Citizenship Education | 1 |
| Computer Science Education | 1 |
| Computer Use | 1 |
| More ▼ | |
Author
| Boyle, Clifton J., III | 1 |
| Chaplik, Andrew M. | 1 |
| Hamman, Seth T. | 1 |
| Hopkinson, Kenneth M. | 1 |
| Markham, Ruth L. | 1 |
| Metzler, Gabrielle E. | 1 |
Publication Type
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Boyle, Clifton J., III – ProQuest LLC, 2010
Misuse of technology is a behavioral pattern that continues to emerge in our society. Television and newspapers continue to list and report technology misuse. A recent study from the Pew Internet and American Life Project has indicated approximately one third of teen are victims of online harassment (Lenhart, 2009). Other prominent problems with…
Descriptors: Control Groups, Urban Schools, Citizenship, Video Games

Peer reviewed
Direct link
