Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Yuli Deng – ProQuest LLC, 2021
Personalized learning is gaining popularity in online computer science education due to its characteristics of pacing the learning progress and adapting the instructional approach to each individual learner from a diverse background. Among various instructional methods in computer science education, hands-on labs have unique requirements of…
Descriptors: Individualized Instruction, Experiential Learning, Computer Science Education, Electronic Learning
Opesade, Adeola O.; Adesina, Omolayo A. – Journal of Cybersecurity Education, Research and Practice, 2020
The use of the Internet among children and adolescents is now a norm in many parts of the world. As the Internet offers a wide range of benefits to these ones, so does it expose them to possible various risks and harm. Researchers in different countries across the world have engaged in the production of relevant research-based knowledge in order…
Descriptors: Internet, Computer Security, Information Security, Children
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods
James T. McCafferty – Journal of Cybersecurity Education, Research and Practice, 2024
Engagement is a critical part of student learning and student success. This is especially true in online classes where students have less interaction with their classmates and instructors when compared to traditional face-to-face courses. Research on engagement has shown that when students are meaningfully engaged it can increase student…
Descriptors: Online Courses, Graduate Study, Computer Security, Learner Engagement
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
Lam, Tsz Yiu; Dongol, Brijesh – Interactive Learning Environments, 2022
The properties of a blockchain such as immutability, provenance, and peer-executed smart contracts could bring a new level of security, trust, and transparency to e-learning. In this paper, we introduce our proof-of-concept blockchain-based e-learning platform developed to increase transparency in assessments and facilitate curriculum…
Descriptors: Information Technology, Web Based Instruction, Instructional Innovation, Electronic Learning
Chin, Amita; Jones, Beth; Little, Philip – International Journal of Education and Development using Information and Communication Technology, 2021
This study on smartphone security behaviors and practices is a continuation of the work in Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive university were compared to results from a 2014 survey at the same institution. That study found that students continued to be lax in their mobile security practices.…
Descriptors: Telecommunications, Handheld Devices, Computer Security, Student Attitudes
Joshua Montgomery – ProQuest LLC, 2021
The problem that was investigated is if the level of cybersecurity knowledge held by technology leaders at Appalachian Ohio schools is placing those schools at risk for exploitation. The research method selected for this study was a quantitative study with a correlational research design. The study looked at two key factors in this relationship,…
Descriptors: Computer Security, Information Security, Security Personnel, Information Technology
James J. Meadows III – ProQuest LLC, 2023
The purpose of this exploratory qualitative study was to explore the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. My study addressed whether security training for teenagers will solve the…
Descriptors: Middle School Students, Public Schools, Gamification, Educational Games
Marquardson, Jim – Information Systems Education Journal, 2020
Information systems tools, techniques, and technologies are changing at an ever-increasing pace. Technical skills with operating systems, applications, and hardware are important to learn in an information systems curriculum so that students can be immediately productive upon graduating, but these skills may have a shelf life. Technical skills…
Descriptors: Lifelong Learning, Technology Uses in Education, Information Systems, Independent Study
Haseski, Halil Ibrahim – International Journal of Research in Education and Science, 2020
The present study aimed to determine the effect of individual cyber security skills of pre-service teachers on their attitudes towards computer-assisted education. Thus, the present research was designed as a correlational study. The study participants included 241 senior pre-service teachers in different departments at Manisa Celal Bayar…
Descriptors: Computer Security, Computer Literacy, Preservice Teachers, Computer Assisted Instruction
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security
Greenhalgh-Spencer, Heather – Educational Theory, 2019
In this article, Heather Greenhalgh-Spencer analyzes three examples of curricula aimed at cultivating good cyber behavior and countering online harassment. These curricula are branded as addressing civic needs, cultivating civic duty, and developing skills to help students understand and react to online threats. Here, Greenhalgh-Spencer offers two…
Descriptors: Computer Security, Safety, Bullying, Computer Mediated Communication
Students as Contested: Exploring Issues of Student Identity and Identification in Educational Spaces
Ashley Kenway; Phil Wilkinson; Kieron Dowden-Smith – International Journal for Students as Partners, 2019
This article explores issues of student identity and identification through a third-space theory lens. In addition, it positions this use of third-space theory as contributory to Students-as-Partners (SaP) approaches to teaching and learning. Naturally, this research was constructed as a SaP project, and research was undertaken as a collaboration…
Descriptors: Self Concept, Undergraduate Students, Student Attitudes, Resistance (Psychology)
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification