NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 16 to 30 of 136 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Editorial Projects in Education, 2024
Blended learning combines traditional classroom instruction with online learning, offering personalized and engaging educational experiences. This Spotlight will help you analyze key research on school tech use; review expert tips for staying ahead of tech trends; explore strategies for engaging virtual instruction; examine how to use tech to meet…
Descriptors: Blended Learning, Technology Uses in Education, Student Needs, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Brown, Lynn – ProQuest LLC, 2023
Students need academic tools and digital skills for proper social interactions in a digital society. Researchers Ribble and Park (2019) designed the S3 Framework which stresses the importance of developing safe, savvy, and social digital citizens. Using this framework, a series of interventions were developed for students and staff to increase the…
Descriptors: Computer Security, Information Security, Safety, Citizenship
Cassie F. Quigley; Danielle Herro – Teachers College Press, 2025
This practical book will help readers understand what STEAM is, how it differs from STEM, and how it can be used to engage students in K-8 classrooms. Readers will find easy-to-understand examples of what STEAM education looks like in a variety of classrooms and will hear from teachers, instructional coaches, principals, and administrators about…
Descriptors: STEM Education, Art Education, Relevance (Education), Elementary School Students
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Peer reviewed Peer reviewed
Direct linkDirect link
Huiling Ma; Lilliati Ismail; Weijing Han – Education and Information Technologies, 2024
The advancement and application of Artificial Intelligence (AI) has introduced innovative changes in language learning and teaching. In particular, the widespread utilization of various chatbots as foreign language learning partners showcases their remarkable potential contribution to the field. Nevertheless, there are currently few studies that…
Descriptors: Bibliometrics, Artificial Intelligence, Computer Software, Second Language Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Borka Jerman Blažic; Andrej Jerman Blažic – International Society for Technology, Education, and Science, 2024
Based on an exhaustive study from 2001-2003 involving 14 high schools in the EU, a definition of the educational content and the aligned methodology for high school levels was developed for two areas--cyber safety and cybersecurity--with the aim of improving the knowledge and skills of students and their teachers. Available sources, including…
Descriptors: Teaching Methods, Computer Science Education, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Saleh, Mohamad – Journal of Instructional Research, 2020
Having a clear teaching strategy is vital when it comes to improving students' retention and preserving their knowledge. Various general teaching approaches have been incorporated into the classrooms as ways of improving teaching and student learning. Some of these approaches proved to be effective and some are ineffective. In this study, I…
Descriptors: Teaching Methods, Computer Security, Instructional Effectiveness, STEM Education
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Peer reviewed Peer reviewed
Direct linkDirect link
Nweke, Livinus Obiora; Bokolo, Anthony Jnr; Mba, Gibson; Nwigwe, Emeka – Education and Information Technologies, 2022
HyFlex termed as hybrid-flexibility is a teaching approach where teachers and students have the alternative to participate in planned courses either remotely or face-to-face. This study examines the effectiveness of the HyFlex pedagogical method to teach highly interactive digital and face-to-face cyber security training in Nigeria amidst the…
Descriptors: Computer Security, Information Security, Videoconferencing, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10