Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Information Security | 6 |
Teaching Methods | 6 |
Universities | 6 |
Foreign Countries | 3 |
Models | 2 |
Privacy | 2 |
Artificial Intelligence | 1 |
Buddhism | 1 |
Bullying | 1 |
Citizenship | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 2 |
Education and Information… | 1 |
Informatics in Education | 1 |
Information Systems Education… | 1 |
International Education… | 1 |
Author
Alkaabi, Shamma | 1 |
Belshaw, Scott H. | 1 |
Biros, David | 1 |
Colaiuta, Alexandrea | 1 |
El Sayed, Hesham | 1 |
Evmorfia-Iro Bartzia | 1 |
Khan, Manzoor Ahmed | 1 |
Ladwig, Christine | 1 |
Marco Sbaraglia | 1 |
Merabet, Adel | 1 |
Michael Lodi | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Research | 4 |
Reports - Descriptive | 2 |
Tests/Questionnaires | 2 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Europe | 1 |
Texas | 1 |
Thailand | 1 |
United Arab Emirates | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Mongkonrat Chaiyadet; Pallop Piriyasurawong; Panita Wannapiroon – International Education Studies, 2024
The objective of this research is to develop and study the outcomes of developing the Ubiquitous Buddhism Learning Ecosystem for Proactive Buddhism Propagation for Digital Citizenship. The sample group used in the research consists of nine individuals selected through targeted sampling, comprising experts in the design and development of learning…
Descriptors: Buddhism, Models, Citizenship, Educational Philosophy
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy