Publication Date
In 2025 | 25 |
Since 2024 | 163 |
Since 2021 (last 5 years) | 423 |
Since 2016 (last 10 years) | 647 |
Since 2006 (last 20 years) | 1225 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Aljuaid, Alanoud – ProQuest LLC, 2022
There is a workforce shortage and a huge gender disparity in the cybersecurity profession globally and Saudi Arabia. Enabling women to access these opportunities involves bolstering training and implementing reforms to give women the go-ahead to access these opportunities. With only a paltry 5% of women being in cybersecurity in the Middle East…
Descriptors: Foreign Countries, Gender Differences, Computer Security, Information Security
Item Order and Speededness: Implications for Test Fairness in Higher Educational High-Stakes Testing
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Principals' Perceptions of Online Teaching and Learning in School after the Outbreak of the Pandemic
Kong, Siu-Cheung; Ma, Yunsi Tina – International Journal of Distance Education Technologies, 2022
The current study aims to analyse school leaders' understanding and expectation of, and support for, online teaching and learning during and after the outbreak of the COVID-19 pandemic. Based on the theory of reasoned action (TRA) framework, the authors designed a questionnaire and collected 319 responses from school principals about their views…
Descriptors: Administrator Attitudes, Principals, Online Courses, COVID-19
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Dana Kube; Sebastian Gombert; Brigitte Suter; Joshua Weidlich; Karel Kreijns; Hendrik Drachsler – Journal of Computer Assisted Learning, 2024
Background: Gender stereotypes about women and men are prevalent in computer science (CS). The study's goal was to investigate the role of gender bias in computer-supported collaborative learning (CSCL) in a CS context by elaborating on gendered experiences in the perception of individual and team performance in mixed-gender teams in a hackathon.…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Gender Issues, Learning Activities
Keith Lee; Evo Popof; Chris Reykdal, Contributor – State Educational Technology Directors Association, 2024
The 2023-24 school year was a big year for educational technology. As the world of educational technology has evolved, so has SETDA's State EdTech Trends Survey. This year's survey and report feature new questions (which will likely become recurring questions) and some changes to old questions to reflect the mainstreaming of AI in K-12 education.…
Descriptors: Educational Technology, Educational Trends, Technology Uses in Education, Artificial Intelligence
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Liew, Tze Wei; Pang, Wei Ming; Leow, Meng Chew; Tan, Su-Mae – Smart Learning Environments, 2022
Emotional design refers to imbuing a multimedia learning environment with design attributes that promote learners' positive affect and motivation to enhance learning. One such feature is anthropomorphism, in which human-like attributes are infused into learning elements in a multimedia learning environment. This study examines the affective,…
Descriptors: Multimedia Instruction, Instructional Design, Multimedia Materials, Human Body
Thomas, Kevin M.; Ivy, Jessica; Cook, Kristin; Kelley, Robert R. – Journal of Cybersecurity Education, Research and Practice, 2022
The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers' technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Security, Computer Security
Joshi, Omkar; Chapagain, Binod; Kharel, Gehendra; Poudyal, Neelam C.; Murray, Bryan D.; Mehmood, Sayeed R. – Interactive Learning Environments, 2022
Many land-grant institutions with agriculture and natural resource programs in the United States offer online courses to meet student demand. The goal of this study was to understand how major educational stakeholders, including instructors and students, perceive the benefits and limitations of online teaching and learning in agriculture and…
Descriptors: Online Courses, Distance Education, Electronic Learning, Web Based Instruction
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Office of Inspector General, US Department of Education, 2022
The U.S. Department of Education (Department) Office of Inspector General (OIG) Strategic Plan for Fiscal Years (FY) 2023 through 2028 represents the planned direction of the organization for FYs 2023-2028. It continues the 40-plus year commitment to the mission to promote the efficiency, effectiveness, and integrity of the Department's programs…
Descriptors: Strategic Planning, Educational Planning, Federal Government, Public Agencies
Cereola, Sandra J.; Dynowska, Joanna – Journal of Cybersecurity Education, Research and Practice, 2019
As the reported number of data breaches increase and senators push for more disclosure regulation, the SEC "staff" issued a guidance in 2011 on disclosure obligations relating to cybersecurity risks and incidents. More recently, on February 26, 2018 the SEC Commission issued interpretive guidance to help assist public companies prepare…
Descriptors: Information Security, Computer Security, Disclosure, Communication (Thought Transfer)