NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 19 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thitima Srivatanakul – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification, including game-based learning (GBL), is a widely recognized pedagogical approach used for imparting and reinforcing cybersecurity knowledge and skills to learners. One innovative form of GBL gaining popularity across various educational levels, from secondary schools to professional development, is escape room-style education. This…
Descriptors: Computer Security, Problem Solving, Gamification, Undergraduate Students
Brown, Lynn – ProQuest LLC, 2023
Students need academic tools and digital skills for proper social interactions in a digital society. Researchers Ribble and Park (2019) designed the S3 Framework which stresses the importance of developing safe, savvy, and social digital citizens. Using this framework, a series of interventions were developed for students and staff to increase the…
Descriptors: Computer Security, Information Security, Safety, Citizenship
Peer reviewed Peer reviewed
Direct linkDirect link
Nweke, Livinus Obiora; Bokolo, Anthony Jnr; Mba, Gibson; Nwigwe, Emeka – Education and Information Technologies, 2022
HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the HyFlex pedagogical method to teach highly interactive digital and face-to-face cyber security training in Nigeria amidst the…
Descriptors: Computer Security, Information Security, Videoconferencing, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
PDF on ERIC Download full text
James T. McCafferty – Journal of Cybersecurity Education, Research and Practice, 2024
Engagement is a critical part of student learning and student success. This is especially true in online classes where students have less interaction with their classmates and instructors when compared to traditional face-to-face courses. Research on engagement has shown that when students are meaningfully engaged it can increase student…
Descriptors: Online Courses, Graduate Study, Computer Security, Learner Engagement
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Mark; Baskett, Mike; Allen, Mark; Francis, Hulya; Kifayat, Kashif – Innovations in Education and Teaching International, 2018
Animated learning materials have the potential to support the teaching and learning process. In this paper, we examine the comparative usefulness of animated and static learning materials for teaching cyber security concepts to a group of UK undergraduate computer science students. The animated cyber security learning materials appeared to be…
Descriptors: Foreign Countries, Information Security, Teaching Methods, Animation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Onah, Daniel F. O.; Pang, Elaine L. L.; Sinclair, Jane E. – Education and Information Technologies, 2020
Independent learning in massive open online courses (MOOCs) requires considerable effort from the learners themselves. Blended-learning has been recognised to foster independent learning among undergraduate students. With the popularity of the blended-learning approach to teach in traditional educational settings, little has been mentioned on how…
Descriptors: Positive Attitudes, Blended Learning, Student Attitudes, Metacognition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dinc, Emre – Contemporary Educational Technology, 2019
This study examined the thoughts of preservice teachers about technology integration and collected their ideas about possible barriers to technology integration in education. With this aim, the participants were asked two key questions which are (1) "What does 'Technology Integration in Education' mean to you?" and (2) "What might…
Descriptors: Preservice Teachers, Technology Integration, Educational Technology, Budgets
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Ramorola, M. Z. – Africa Education Review, 2013
South African teachers are faced with challenges in integrating technology effectively into a coherent framework at school level. There seems to be little evidence of technology integration into classroom activities such as systematic planning and implementation of lessons that require learners to think critically, work collaboratively, and use…
Descriptors: Teaching Methods, Technology Integration, Secondary School Teachers, Secondary School Students
Previous Page | Next Page »
Pages: 1  |  2