Publication Date
In 2025 | 2 |
Since 2024 | 13 |
Since 2021 (last 5 years) | 68 |
Since 2016 (last 10 years) | 121 |
Since 2006 (last 20 years) | 330 |
Descriptor
Source
Author
Goldsborough, Reid | 6 |
Villano, Matt | 5 |
Descy, Don E. | 4 |
Hope, Andrew | 4 |
Panettieri, Joseph C. | 3 |
Almes, Guy T. | 2 |
Anderson, Jimmeka | 2 |
Bennett, Cedric | 2 |
Benson, Allen C. | 2 |
Botterman, Maarten | 2 |
Breeding, Marshall | 2 |
More ▼ |
Publication Type
Education Level
Audience
Administrators | 14 |
Teachers | 14 |
Practitioners | 13 |
Parents | 7 |
Media Staff | 6 |
Policymakers | 3 |
Students | 3 |
Counselors | 1 |
Location
United Kingdom | 13 |
Turkey | 12 |
United States | 10 |
Australia | 9 |
California | 8 |
Texas | 8 |
Canada | 7 |
Spain | 7 |
India | 6 |
Massachusetts | 6 |
Ohio | 6 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Kaur, Kanwalinderjit – Journal of Cybersecurity Education, Research and Practice, 2023
Embedding a pairwise key distribution approach in IoT systems is challenging as IoT devices have limited resources, such as memory, processing power, and battery life. This paper presents a secure and lightweight approach that is applied to IoT devices that are divided into Voronoi clusters. This proposed algorithm comprises XOR and concatenation…
Descriptors: Internet, Computer Security, Algorithms, Equipment
Kuru, Hüseyin – Journal of Learning and Teaching in Digital Age, 2023
After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has…
Descriptors: Terrorism, Information Technology, Facilities, Nuclear Energy
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Mari-Liisa Parder; Pieter Gryffroy; Marten Juurik – Research Ethics, 2024
The growing importance of researching online activities, such as cyber-deviance and cyber-crime, as well as the use of online tools (e.g. questionnaires, games, and other interactive tools) has created new ethical and legal challenges for researchers, which can be even more complicated when researching adolescents. In this article, we highlight…
Descriptors: Foreign Countries, Crime Prevention, Ethics, Computer Security
Holly A. Encina – ProQuest LLC, 2021
The Internet of Things (IoT) and Internet-connected technologies are becoming more and more prevalent in our houses today, with over 31 billion connected devices all over the world. This qualitative exploratory study looks at ten participants' home devices and protection measures. The participants were all considered the head of the household and…
Descriptors: Internet, Computer Security, Prevention, Motivation
Patrick Ward – ProQuest LLC, 2024
This proposal is to develop a framework for designing a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges such as program accreditation, workforce development, and Department of Homeland Security/National Security Agency…
Descriptors: Community Colleges, College Programs, Computer Security, Internet
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Md Alimul Haque; Shameemul Haque; Sana Zeba; Kailash Kumar; Sultan Ahmad; Moidur Rahman; Senapathy Marisennayya; Laiq Ahmed – E-Learning and Digital Media, 2024
E-Learning Education systems are gaining attention day-to-day because of their inclusive pertinence in the distance education system. Due to COVID-19, the online learning education system has become very popular. Most probably, all education systems have been using the IoT-based E-Learning system to continue the students' education without…
Descriptors: Electronic Learning, Internet, Information Networks, Technology Uses in Education
Serena Sullivan – ProQuest LLC, 2022
The complexity and frequency of online attacks have been steadily increasing; additional privacy protection and security measures are necessary for individuals to safeguard Personal Identifiable Information (PII). Challenges exist for Trinidad State College (TSC) students to improve online personal privacy protection behaviors. Protective…
Descriptors: Rural Schools, College Students, Privacy, Internet
Francisco D. Guillén-Gámez; Inmaculada Martínez-García; Enrique Alastor; Lukasz Tomczyk – Computers in the Schools, 2024
The authors have developed a psychometric instrument with the purpose of assessing the digital competencies of teachers in aspects of cybersecurity. From the collection of data, different secondary objectives were carried out: (1) identify if there were significant differences regarding gender; (2) understand if there are significant differences…
Descriptors: Preservice Teachers, Technological Literacy, Internet, Safety
Zorlu, Eyup – Journal of Learning and Teaching in Digital Age, 2023
The purpose of this study is to examine the relationship between college students' cyberbullying awareness and their ability to ensure their personal cybersecurity. A total of 401 students participated in this study. The Ability to Ensure Personal Cybersecurity Scale, the Cyberbullying Awareness Scale, and a Personal Information Form developed by…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Knowledge Level
Norma Torres-Hernández; María-Jesús Gallego-Arrufat; María del Mar García-Ruiz – Digital Education Review, 2023
Online risks are a concern for citizens in the digital society. Many sectors of the population lack training to face, prevent and solve problematic situations arising from Internet use. University researchers and innovation agents in small towns in southern Spain are carrying out an educational programme of 13 intergenerational workshops to…
Descriptors: Intergenerational Programs, Digital Literacy, Internet, Open Education
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education