Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Privacy | 4 |
Information Security | 3 |
Computer Science Education | 2 |
Ethics | 2 |
Foreign Countries | 2 |
Learner Engagement | 2 |
Access to Information | 1 |
Active Learning | 1 |
Barriers | 1 |
Civil Rights | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 4 |
Author
Beasley, Shannon W. | 1 |
Foreman, Daniel | 1 |
Jens Myrup Pedersen | 1 |
Jinghua Zhang | 1 |
Jinsheng Xu | 1 |
Kelvin Bryant | 1 |
Kevin Hilliard | 1 |
Kirk, Sarah | 1 |
Kristian Helmer Kjær Larsen | 1 |
Lee, Cody | 1 |
Mubashrah Saddiqa | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Reports - Evaluative | 1 |
Education Level
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Denmark | 1 |
European Union | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Kirk, Sarah; Foreman, Daniel; Lee, Cody; Beasley, Shannon W. – Journal of Cybersecurity Education, Research and Practice, 2019
The goal of this research is to describe an active learning opportunity that was conducted as a community service offering through our Center for Cybersecurity Education and Applied Research (CCEAR). As a secondary goal, the participants sought to gain real world experience by applying techniques and concepts studied in security classes. A local…
Descriptors: Active Learning, Computer Security, Information Security, Access to Information