Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 7 |
Interdisciplinary Approach | 7 |
Teaching Methods | 7 |
Cooperative Learning | 4 |
Learning Activities | 4 |
Problem Solving | 4 |
Academic Achievement | 3 |
Case Studies | 3 |
Cognitive Processes | 3 |
Computer Mediated… | 3 |
Computer Science Education | 3 |
More ▼ |
Source
International Association for… | 2 |
Association for Educational… | 1 |
European Journal of Education | 1 |
Informatics in Education | 1 |
ProQuest LLC | 1 |
SAGE Open | 1 |
Author
Publication Type
Collected Works - Proceedings | 3 |
Journal Articles | 3 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Elementary Secondary Education | 3 |
Postsecondary Education | 3 |
Elementary Education | 2 |
Early Childhood Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Secondary Education | 1 |
Audience
Practitioners | 1 |
Location
Asia | 2 |
Brazil | 2 |
United States | 2 |
Australia | 1 |
Bulgaria | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Europe | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods
Rigby, Steven – ProQuest LLC, 2009
A universal problem to our society is the dramatic increase in the number of security threats, risks, and vulnerabilities to our nation's computer systems, data, and infrastructure. Our future success depends upon the problem-solving and thinking abilities of professionals entering the Information Assurance and Security (IAS) field. These…
Descriptors: Information Security, Computer Security, Technology Education, Teaching Methods
Sánchez, Inmaculada Arnedillo, Ed.; Isaías, Pedro, Ed. – International Association for Development of the Information Society, 2014
These proceedings contain the papers of the 10th International Conference on Mobile Learning 2014, which was organised by the International Association for Development of the Information Society, in Madrid, Spain, February 28-March 2, 2014. The Mobile Learning 2014 International Conference seeks to provide a forum for the presentation and…
Descriptors: Conference Papers, Telecommunications, Handheld Devices, Technology Uses in Education
Simonson, Michael, Ed.; Crawford, Margaret, Ed. – Association for Educational Communications and Technology, 2004
For the twenty-seventh year, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the National AECT Convention in Chicago, Illinois. The Proceedings of AECT's Convention are published in two…
Descriptors: Research and Development, Communications, Educational Technology, Mathematics Instruction
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers