Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Assisted Testing | 3 |
Computer Security | 3 |
Safety | 3 |
Internet | 2 |
Risk | 2 |
Alignment (Education) | 1 |
Certification | 1 |
Computer Science Education | 1 |
Computer Software | 1 |
Concept Mapping | 1 |
Course Content | 1 |
More ▼ |
Publication Type
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Journal Articles | 1 |
Speeches/Meeting Papers | 1 |
Education Level
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
District of Columbia | 1 |
Europe | 1 |
Maryland | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Borka Jerman Blažic; Andrej Jerman Blažic – International Society for Technology, Education, and Science, 2024
Based on an exhaustive study from 2001-2003 involving 14 high schools in the EU, a definition of the educational content and the aligned methodology for high school levels was developed for two areas--cyber safety and cybersecurity--with the aim of improving the knowledge and skills of students and their teachers. Available sources, including…
Descriptors: Teaching Methods, Computer Science Education, Information Security, Computer Security
Chen, Yong; He, Wu – International Review of Research in Open and Distance Learning, 2013
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…
Descriptors: Computer Security, Risk, Online Courses, Electronic Publishing
Pierce, Steven Russell – ProQuest LLC, 2009
Information technology (IT) certifiers evaluate risk and develop mitigations ensuring IT infrastructures remain protected within acceptable levels of operation, which if not properly maintained can potentially result in loss of life within Department of Defense (DoD) and federal environments. This qualitative phenomenological exploratory study…
Descriptors: Data Analysis, Certification, Internet, Information Technology