Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Internet | 2 |
| Program Evaluation | 2 |
| Bullying | 1 |
| Citizenship Education | 1 |
| Community Colleges | 1 |
| Computer Mediated… | 1 |
| Course Content | 1 |
| Course Descriptions | 1 |
| Crime | 1 |
| Curriculum Development | 1 |
| More ▼ | |
Author
| Belshaw, Scott H. | 1 |
| Cheryl L. Beseler | 1 |
| Colaiuta, Alexandrea | 1 |
| Kimberly J. Mitchell | 1 |
| Lisa M. Jones | 1 |
| Nodeland, Brooke | 1 |
| Underwood, Lorrin | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Elementary Education | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Two Year Colleges | 1 |
Audience
Location
| Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lisa M. Jones; Kimberly J. Mitchell; Cheryl L. Beseler – Contemporary School Psychology, 2024
School psychologists and other school professionals are increasingly turning to digital citizenship programs to improve children's online safety. However, to date, there has been no rigorous outcome evaluation of these programs. The current study used a cluster randomized control trial methodology (CRCT) to evaluate the impact of the Be Internet…
Descriptors: Elementary School Students, Computer Security, Bullying, Computer Mediated Communication
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security

Peer reviewed
Direct link
