Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Competition | 4 |
Information Security | 4 |
Teaching Methods | 4 |
Computer Science Education | 2 |
Computer Security | 2 |
Outcomes of Education | 2 |
Puzzles | 2 |
Armed Forces | 1 |
COVID-19 | 1 |
College Students | 1 |
Computer Games | 1 |
More ▼ |
Author
Alkaabi, Shamma | 1 |
Anderson, James | 1 |
Baggili, Ibrahim | 1 |
Balon, Tyler | 1 |
Beuran, Razvan | 1 |
El Sayed, Hesham | 1 |
Graham, Kendra | 1 |
Hasegawa, Shinobu | 1 |
Heitmeyer, Bryce | 1 |
Khan, Manzoor Ahmed | 1 |
Lin, Alan C. | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Information Analyses | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
United Arab Emirates | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Beuran, Razvan; Tang, Dat; Tan, Zheyu; Hasegawa, Shinobu; Tan, Yasuo; Shinoda, Yoichi – Education and Information Technologies, 2019
Cybersecurity education and training are being conducted on an ever-increasing scale, as most organizations need to improve their readiness in dealing with the more and more frequent cyberattacks. However, most systems used for such education and training purposes are built from scratch, are highly customized, and often proprietary. This is true…
Descriptors: Information Security, Teaching Methods, Management Systems, Information Systems
Graham, Kendra; Anderson, James; Rife, Conrad; Heitmeyer, Bryce; Patel, Pranav R.; Nykl, Scott; Lin, Alan C.; Merkle, Laurence D. – IEEE Transactions on Learning Technologies, 2020
Cyberspace odyssey (CSO) is a novel serious game supporting computer networking education by engaging students in a race to successfully perform various cybersecurity tasks in order to collect clues and solve a puzzle in virtual near-Earth three-dimensional space. Each team interacts with the game server through a dedicated client presenting a…
Descriptors: Computer Networks, Information Security, Task Analysis, Computer Games