Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 12 |
Since 2006 (last 20 years) | 14 |
Descriptor
Computer Simulation | 14 |
Information Security | 14 |
Teaching Methods | 14 |
Computer Science Education | 7 |
Computer Security | 7 |
Computer Software | 6 |
Educational Technology | 5 |
Higher Education | 5 |
Online Courses | 5 |
Computer Games | 3 |
Computer Mediated… | 3 |
More ▼ |
Source
Author
Alexandra Rysul'ova | 1 |
Ali, Mohd Norawi | 1 |
Anderson, James | 1 |
Baker, Elizabeth | 1 |
Brilingaite, Agne | 1 |
Bukauskas, Linas | 1 |
Dhanya Pramod | 1 |
Graham, Kendra | 1 |
He, Wu | 1 |
Heitmeyer, Bryce | 1 |
Huang, Wanju | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Research | 6 |
Reports - Descriptive | 4 |
Collected Works - Proceedings | 2 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 9 |
Postsecondary Education | 8 |
Secondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dhanya Pramod – Journal of Applied Research in Higher Education, 2025
Purpose: The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and…
Descriptors: Gamification, Computer Security, Information Security, Training
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Workman, Michael D. – Journal of Cybersecurity Education, Research and Practice, 2021
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of…
Descriptors: Computer Security, Information Security, Computer Science Education, Instructional Effectiveness
Huang, Wanju – TechTrends: Linking Research and Practice to Improve Learning, 2023
A design case is a form of scholarly writing in which the author embarks on a reflective journey sharing rich descriptions of their design, design processes, challenges, etc. This paper presents two design cases that demonstrate how learning theories and instructional design concepts were purposefully incorporated in two instructional applications…
Descriptors: Learning Processes, Instructional Design, Learning Theories, Artificial Intelligence
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Ravendran, Saravnesvaran; Karpudewan, Mageswary; Ali, Mohd Norawi; Lay, Yoon Fah – Malaysian Online Journal of Educational Sciences, 2023
The Fourth Industrial Revolution (4IR) refers to the current rapid technological growth that fundamentally changes how humans live. 4IR is essential to improve higher education worldwide and develop crucial skills such as e-learning and innovation, information and media technology, and life and career skills. This study aims to assess the…
Descriptors: Technological Advancement, Foreign Countries, Technological Literacy, Pedagogical Content Knowledge
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Graham, Kendra; Anderson, James; Rife, Conrad; Heitmeyer, Bryce; Patel, Pranav R.; Nykl, Scott; Lin, Alan C.; Merkle, Laurence D. – IEEE Transactions on Learning Technologies, 2020
Cyberspace odyssey (CSO) is a novel serious game supporting computer networking education by engaging students in a race to successfully perform various cybersecurity tasks in order to collect clues and solve a puzzle in virtual near-Earth three-dimensional space. Each team interacts with the game server through a dedicated client presenting a…
Descriptors: Computer Networks, Information Security, Task Analysis, Computer Games
Online Learning Consortium, 2022
The purpose of this report is to explore global trends, emerging research, innovative models, and expert insights regarding the future of learning by detailing the present context of a rapidly changing and hyper-connected world. Our innovation framework for describing the future of digital learning, which emerged during the research process,…
Descriptors: Foreign Countries, Educational Technology, Online Courses, Electronic Learning
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang – Journal of Information Systems Education, 2014
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Descriptors: Information Security, Case Studies, Teaching Methods, Active Learning
Niles, Thaddeus M. – Teaching English with Technology, 2013
Course management software (CMS) allows teachers to deliver content electronically and manage collaborative coursework, either blending with face-to-face interactions or as the core of an entirely virtual classroom environment. CMS often takes the form of an electronic storehouse of course materials with which students can interact, a virtual…
Descriptors: Management Systems, Teaching Methods, Computer Software, Professional Autonomy
Association Supporting Computer Users in Education, 2017
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Computer Software, Conferences (Gatherings)
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation