Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 8 |
Instructional Effectiveness | 8 |
Student Attitudes | 8 |
Teaching Methods | 6 |
Educational Technology | 4 |
Case Studies | 3 |
Computer Science Education | 3 |
Computer Software | 3 |
Electronic Learning | 3 |
Foreign Countries | 3 |
Internet | 3 |
More ▼ |
Source
Education and Information… | 2 |
Contemporary Educational… | 1 |
Information Science Reference | 1 |
International Association for… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
Author
Bokolo, Anthony Jnr | 1 |
Boyle, Clifton J., III | 1 |
Davis, Martin H., Jr. | 1 |
Dinc, Emre | 1 |
Duffy, Kevin P. | 1 |
Jun-Ming Su | 1 |
Mba, Gibson | 1 |
Ng, Eugenia M. W., Ed. | 1 |
Nweke, Livinus Obiora | 1 |
Nwigwe, Emeka | 1 |
Sethi, Vikram | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Evaluative | 2 |
Books | 1 |
Collected Works - General | 1 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Elementary Secondary Education | 3 |
Elementary Education | 2 |
Adult Education | 1 |
Audience
Practitioners | 1 |
Researchers | 1 |
Location
Pennsylvania | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Thitima Srivatanakul – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification, including game-based learning (GBL), is a widely recognized pedagogical approach used for imparting and reinforcing cybersecurity knowledge and skills to learners. One innovative form of GBL gaining popularity across various educational levels, from secondary schools to professional development, is escape room-style education. This…
Descriptors: Computer Security, Problem Solving, Gamification, Undergraduate Students
Nweke, Livinus Obiora; Bokolo, Anthony Jnr; Mba, Gibson; Nwigwe, Emeka – Education and Information Technologies, 2022
HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the HyFlex pedagogical method to teach highly interactive digital and face-to-face cyber security training in Nigeria amidst the…
Descriptors: Computer Security, Information Security, Videoconferencing, Student Attitudes
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Dinc, Emre – Contemporary Educational Technology, 2019
This study examined the thoughts of preservice teachers about technology integration and collected their ideas about possible barriers to technology integration in education. With this aim, the participants were asked two key questions which are (1) "What does 'Technology Integration in Education' mean to you?" and (2) "What might…
Descriptors: Preservice Teachers, Technology Integration, Educational Technology, Budgets
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement
Boyle, Clifton J., III – ProQuest LLC, 2010
Misuse of technology is a behavioral pattern that continues to emerge in our society. Television and newspapers continue to list and report technology misuse. A recent study from the Pew Internet and American Life Project has indicated approximately one third of teen are victims of online harassment (Lenhart, 2009). Other prominent problems with…
Descriptors: Control Groups, Urban Schools, Citizenship, Video Games
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers