Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Handheld Devices | 2 |
| Privacy | 2 |
| Program Effectiveness | 2 |
| Telecommunications | 2 |
| Computer Oriented Programs | 1 |
| Computer Software | 1 |
| Elementary Secondary Education | 1 |
| Experiential Learning | 1 |
| Higher Education | 1 |
| Information Security | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security

Peer reviewed
Direct link
