NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 9 results Save | Export
Jeremy Jon Bro – ProQuest LLC, 2023
Secure Code Education (SCE) is the compliance requirement for many organizations in the U.S. Consequently, many U.S. companies spend large sums on programs and tooling to meet this requirement and to upskill their developers. This tooling is largely underutilized. Classes beyond the bare required minimum are often not taken advantage of, leaving…
Descriptors: Coding, Gamification, Vignettes, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Frontera, Paul J.; Rodriguez-Seda, Erick J. – IEEE Transactions on Education, 2021
Contribution: This article presents a project-based learning (PBL) activity for use in the instruction of network attacks on cyber-physical systems. Student learning is analyzed to determine the project's contribution to learning outcome attainment. Background: The literature contains a significant amount of research on the benefits of PBL as a…
Descriptors: Student Projects, Teaching Methods, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jiow, Hee Jhee; Mwagwabi, Florence; Low-Lim, Anita – Journal of Media Literacy Education, 2021
This study adopts an experimental design to investigate the effectiveness of a password hygiene training programme. The password hygiene training programme adopted the Protection Motivation Theory's framework in its development, and was delivered online to 84 students aged 13 to 16. Strength of password measures, such as time taken, and number of…
Descriptors: Media Literacy, Information Security, Teaching Methods, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Adorjan, Michael; Ricciardelli, Rosemary – Learning, Media and Technology, 2019
While previous research identifies skepticism and some animosity among students towards school-based cyber-safety programs, drawing from focus group discussions with Canadian teens, this paper contributes to unpacking reasons for both support for 'what works' and antagonism for what is perceived to be lacking. Our findings reveal support for…
Descriptors: Information Security, Computer Security, Criticism, High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Bhuyan, Jay; Wu, Fan; Thomas, Cassandra; Koong, Kai; Hur, Jung Won; Wang, Chih-hsuan – TechTrends: Linking Research and Practice to Improve Learning, 2020
This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the…
Descriptors: Teaching Methods, Grade 10, Grade 11, High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; McCoey, Margaret – International Journal of Information and Communication Technology Education, 2016
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
Descriptors: Ethics, Information Security, Curriculum, Experiential Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Yuan, Xiaohong; Williams, Kenneth; Yu, Huiming; Rorrer, Audrey; Chu, Bei-Tseng; Yang, Li; Winters, Kathy; Kizza, Joseph – Journal of Information Systems Education, 2017
Though many Information Assurance (IA) educators agree that hands-on exercises and case studies improve student learning, hands-on exercises and case studies are not widely adopted due to the time needed to develop them and integrate them into curricula. Under the support of the National Science Foundation (NSF) Scholarship for Service program, we…
Descriptors: Case Studies, Information Security, Teacher Workshops, Teaching Methods