NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Rice, Jeffrey Philip – ProQuest LLC, 2021
Using the lived experiences of study participants, the purpose of the exploratory qualitative study was to explore collegiate cybersecurity instructors' qualities needed to maximize the engagement of Generation Z cybersecurity learners to successfully become cybersecurity specialists. This understanding is important in order to increase the…
Descriptors: Information Security, Computer Security, Age Groups, Specialists
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Arboledas-Brihuega, David – Journal of Technology and Science Education, 2019
It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in…
Descriptors: Mathematics, Curriculum Implementation, Active Learning, Student Projects
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Havenga, Marietjie; Drevin, Lynette – International Association for Development of the Information Society, 2020
Although postgraduate students are required to be self-directed, this is not always the case. The aims of this study were twofold. Firstly, we investigated whether the use of problem-based projects supported students in implementing different cryptography algorithms as part of a group assignment. Secondly, we determined to which extent the use of…
Descriptors: Problem Based Learning, Independent Study, Graduate Students, Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Mark; Baskett, Mike; Allen, Mark; Francis, Hulya; Kifayat, Kashif – Innovations in Education and Teaching International, 2018
Animated learning materials have the potential to support the teaching and learning process. In this paper, we examine the comparative usefulness of animated and static learning materials for teaching cyber security concepts to a group of UK undergraduate computer science students. The animated cyber security learning materials appeared to be…
Descriptors: Foreign Countries, Information Security, Teaching Methods, Animation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Elmali, Filiz; Tekin, Ahmet; Polat, Ebru – Turkish Online Journal of Distance Education, 2020
The main goal of this study is to determine the digital citizenship perceptions and digital citizenship levels of preschool teacher candidates in terms of digital rights and responsibilities, digital security and digital law by comparing them with Computer and Instructional Technologies teacher candidates' perception. To this end, we worked with…
Descriptors: Preservice Teachers, Preservice Teacher Education, Preschool Education, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Safsouf, Yassine; Mansouri, Khalifa; Poirier, Franck – International Association for Development of the Information Society, 2020
The purpose of this study is to find ways to monitor and evaluate the user experience of learners as they use an e-learning system. To do this, we have identified several factors that allow us to measure this experience. We have designed an online measurement scale, presented as a self-administered questionnaire, specifically dedicated to…
Descriptors: Evaluation Methods, Online Courses, Student Attitudes, Integrated Learning Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nyinkeu, Ngatchu Damen; Anye, Divine; Kwedeu, Leonnel; Buttler, William – International Journal of Technology in Teaching and Learning, 2018
In this era of technological abundance, it is difficult to imagine cyber education outside the cyberspace. The purpose of this paper is to extend the growing body of research on cyber education, by reporting the experiences of a Cybersecurity department cut-off from Internet access. The value of Cyber education is expressed even beyond the…
Descriptors: Catholics, Church Related Colleges, Information Security, Internet
Previous Page | Next Page »
Pages: 1  |  2