Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Science Education | 5 |
| Computer Security | 5 |
| Thinking Skills | 5 |
| Information Security | 3 |
| Internet | 3 |
| Career Readiness | 2 |
| Case Studies | 2 |
| College Students | 2 |
| Computer Networks | 2 |
| Cooperation | 2 |
| Correlation | 2 |
| More ▼ | |
Source
| Discover Education | 1 |
| IEEE Transactions on Education | 1 |
| Information Systems Education… | 1 |
| International Association for… | 1 |
| Knowledge Quest | 1 |
Author
| Bennett, Judith | 1 |
| Chaplik, Andrew M. | 1 |
| Hamman, Seth T. | 1 |
| Hopkinson, Kenneth M. | 1 |
| Jim Belair | 1 |
| Karen Renaud | 1 |
| Lara A. Wood | 1 |
| Maria Lamond | 1 |
| Markham, Ruth L. | 1 |
| Metzler, Gabrielle E. | 1 |
| Nicole Waskie-Laura | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Collected Works - Proceedings | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 3 |
| Elementary Secondary Education | 2 |
| Postsecondary Education | 2 |
| Elementary Education | 1 |
Audience
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| Greece | 1 |
| Hawaii | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Maria Lamond; Suzanne Prior; Karen Renaud; Lara A. Wood – Discover Education, 2025
Digital technology is a part of children's everyday lives, yet very little known about teachers' perceptions and practice of cybersecurity education in primary education. This study aimed to shed light on this, focusing primarily on children's password practices. A questionnaire was distributed to primary school teachers across Scotland, with 114…
Descriptors: Elementary School Teachers, Teacher Attitudes, Computer Security, Information Security
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Shannon, Li-Jen; Bennett, Judith – Information Systems Education Journal, 2012
A majority of incoming college freshmen and sophomores have not applied their critical thinking skills as part of their learning process. This paper investigates how students acquire their critical thinking skills while facing the copyright, fair use, and internet security challenges in this contemporary digital society. The findings show that 90…
Descriptors: Critical Thinking, Thinking Skills, Case Studies, Computer Science Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
Direct link
