Publication Date
| In 2026 | 0 |
| Since 2025 | 10 |
| Since 2022 (last 5 years) | 62 |
| Since 2017 (last 10 years) | 119 |
| Since 2007 (last 20 years) | 316 |
Descriptor
Source
Author
| Goldsborough, Reid | 6 |
| Villano, Matt | 5 |
| Descy, Don E. | 4 |
| Hope, Andrew | 4 |
| Panettieri, Joseph C. | 3 |
| Almes, Guy T. | 2 |
| Anderson, Jimmeka | 2 |
| Bennett, Cedric | 2 |
| Benson, Allen C. | 2 |
| Botterman, Maarten | 2 |
| Breeding, Marshall | 2 |
| More ▼ | |
Publication Type
Education Level
Audience
| Administrators | 14 |
| Teachers | 14 |
| Practitioners | 13 |
| Parents | 7 |
| Media Staff | 6 |
| Policymakers | 3 |
| Students | 3 |
| Counselors | 1 |
Location
| United Kingdom | 13 |
| Turkey | 12 |
| United States | 10 |
| Australia | 9 |
| California | 8 |
| Texas | 8 |
| Canada | 7 |
| Spain | 7 |
| India | 6 |
| Massachusetts | 6 |
| Ohio | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Esra Merve Çaliskan; I?rem I?tegin – Journal of Cybersecurity Education, Research and Practice, 2024
With the development of technology, security, a core human concern throughout history, has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of…
Descriptors: Gender Differences, Computer Security, Information Security, Sex Role
Panskyi, Taras; Korzeniewska, Ewa – Education and Information Technologies, 2023
The authors decided to investigate the impact of the pandemic period and the resulting limitations in Polish primary school online security education. The first part of the study investigates the impact of the COVID-19 pandemic on students' educational learning outcomes in information and Internet security. The study has been performed via a…
Descriptors: Elementary School Students, Foreign Countries, Computer Security, Pandemics
Arikli, Güven – Turkish Online Journal of Educational Technology - TOJET, 2023
Real-life threats are at the root of all possible threats to be encountered on the Internet. All risk headings for the Internet are situations that can be encountered in real life. Therefore, we should pay attention to the risks of the virtual world by learning to use the internet consciously, safely and effectively, and by teaching our children…
Descriptors: Internet, Computer Use, Child Safety, Family Role
Barrett, Diane – Information Systems Education Journal, 2020
In a cloud computing environment, traditional digital forensic processes (such as turning off the computer to image the computer hard drive) can be disruptive to businesses because the data of businesses may be co-mingled with other content. As technology changes, the way digital forensics acquisitions are conducted are also changing. The change…
Descriptors: Computer Science Education, Crime, Evidence, Computer Security
Raju, Rajeswari; Abd Rahman, Nur Hidayah; Ahmad, Atif – Asian Journal of University Education, 2022
As COVID-19 took hold, online learning became the norm as universities and classrooms worldwide were forced to close their doors. Education institute closures impacted more than 1.2 billion students across 186 countries as of April 2020. This pandemic, too, has shifted our Malaysian education sector as well. Academicians and students are adopting…
Descriptors: Foreign Countries, Computer Security, Knowledge Level, College Students
G. S. Prakasha; Juan José Leiva-Olivencia; Amber Simpson; Trent Grundmeyer; Anthony Kenneth – Computers in the Schools, 2024
Higher education students use digital devices for learning, entertainment, and financial transactions. The present study examines undergraduate (UG) students' challenges faced in cyber security space amid digital environments. The study employed a qualitative research design with a narrative inquiry method to capture the lived experiences,…
Descriptors: Student Experience, Barriers, Coping, Undergraduate Students
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Lisa M. Jones; Kimberly J. Mitchell; Cheryl L. Beseler – Contemporary School Psychology, 2024
School psychologists and other school professionals are increasingly turning to digital citizenship programs to improve children's online safety. However, to date, there has been no rigorous outcome evaluation of these programs. The current study used a cluster randomized control trial methodology (CRCT) to evaluate the impact of the Be Internet…
Descriptors: Elementary School Students, Computer Security, Bullying, Computer Mediated Communication
Ghosh, Swagata; Chauhan, Gajendra Singh; Kotwal, Renu – Digital Education Review, 2023
The COVID-19 pandemic has fast-tracked the development of digital applications and inspired everyone to adapt to the technologies to curb the spread of outbreak. As this crisis intensifies, the rapid usage of digital devices and apps has echoed the serious concerns about civil liberties, privacy, and data protection. Considering the situation,…
Descriptors: Foreign Countries, Youth, Digital Literacy, Privacy
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
Chapman, John – Higher Education Policy Institute, 2019
Higher education regularly experiences cyber attacks. Organisations that do not adequately protect themselves risk the loss or exposure of personal student and staff data and also commercial, institutional and research data that are valuable to cyber criminals operating domestically and internationally. This paper discusses: (1) the current…
Descriptors: Higher Education, Internet, Information Security, Computer Security
Lim, Alliyza; Brewer, Neil; Young, Robyn L. – Journal of Autism and Developmental Disorders, 2023
Reports of cybercrime being committed by people on the autism spectrum often imply that autism may be more prevalent among cybercriminals than the general population, although this remains unproven. In an online survey of 302 participants, we found that autistic individuals (n = 25) were more likely to report engagement in cybercrime than…
Descriptors: Crime, Internet, Information Security, Autism Spectrum Disorders
Ganesh Iyer – ProQuest LLC, 2021
This quantitative, cross-sectional study investigated the relationship between the concern for information privacy (CFIP) of Indian undergraduate students and their willingness to provide personal information to transact on the Internet (PPIT). The study also examined the mediating effects of internet trust and perceived internet privacy risk on…
Descriptors: Foreign Countries, Undergraduate Students, Privacy, Computer Security
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods

Peer reviewed
Direct link
