Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Information Security | 4 |
Program Effectiveness | 4 |
Teaching Methods | 4 |
High School Students | 2 |
Student Projects | 2 |
Teamwork | 2 |
Active Learning | 1 |
Artificial Intelligence | 1 |
Asynchronous Communication | 1 |
Aviation Technology | 1 |
More ▼ |
Source
IEEE Transactions on Education | 1 |
Journal of Cybersecurity… | 1 |
Learning, Media and Technology | 1 |
TechTrends: Linking Research… | 1 |
Author
Adorjan, Michael | 1 |
Bhuyan, Jay | 1 |
Biros, David | 1 |
Frontera, Paul J. | 1 |
Hur, Jung Won | 1 |
Koong, Kai | 1 |
Ricciardelli, Rosemary | 1 |
Rodriguez-Seda, Erick J. | 1 |
Sikolia, David | 1 |
Thomas, Cassandra | 1 |
Wang, Chih-hsuan | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Tests/Questionnaires | 1 |
Education Level
High Schools | 2 |
Secondary Education | 2 |
Grade 10 | 1 |
Grade 11 | 1 |
Higher Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Audience
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Frontera, Paul J.; Rodriguez-Seda, Erick J. – IEEE Transactions on Education, 2021
Contribution: This article presents a project-based learning (PBL) activity for use in the instruction of network attacks on cyber-physical systems. Student learning is analyzed to determine the project's contribution to learning outcome attainment. Background: The literature contains a significant amount of research on the benefits of PBL as a…
Descriptors: Student Projects, Teaching Methods, Computer Security, Information Security
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Adorjan, Michael; Ricciardelli, Rosemary – Learning, Media and Technology, 2019
While previous research identifies skepticism and some animosity among students towards school-based cyber-safety programs, drawing from focus group discussions with Canadian teens, this paper contributes to unpacking reasons for both support for 'what works' and antagonism for what is perceived to be lacking. Our findings reveal support for…
Descriptors: Information Security, Computer Security, Criticism, High School Students
Bhuyan, Jay; Wu, Fan; Thomas, Cassandra; Koong, Kai; Hur, Jung Won; Wang, Chih-hsuan – TechTrends: Linking Research and Practice to Improve Learning, 2020
This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the…
Descriptors: Teaching Methods, Grade 10, Grade 11, High School Students