Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Wang, Minjuan; Yu, Haiyang; Bell, Zerla; Chu, Xiaoyan – IEEE Transactions on Learning Technologies, 2022
The Metaverse is a network of 3-D virtual worlds supporting social connections among its users and enabling them to participate in activities mimicking real life. It merges physical and virtual reality and provides channels for multisensory interactions and immersions in a variety of environments (Mystakidis, 2022). The Metaverse is considered the…
Descriptors: Technology Uses in Education, Computer Simulation, Educational Environment, Best Practices
Tewari, Alok; Singh, Ram; Mathur, Smriti; Pande, Sushil – International Journal of Information and Learning Technology, 2023
Purpose: The current study employs a modified framework of the unified theory of acceptance and use of technology (UTAUT) to predict students' intention to adopt online learning in India. The moderating role of openness to change in influencing the proposed relationships is also assessed. Design/methodology/approach: A structured questionnaire was…
Descriptors: Intention, Educational Technology, Online Courses, Student Attitudes
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Ghosh, Swagata; Chauhan, Gajendra Singh; Kotwal, Renu – Digital Education Review, 2023
The COVID-19 pandemic has fast-tracked the development of digital applications and inspired everyone to adapt to the technologies to curb the spread of outbreak. As this crisis intensifies, the rapid usage of digital devices and apps has echoed the serious concerns about civil liberties, privacy, and data protection. Considering the situation,…
Descriptors: Foreign Countries, Youth, Digital Literacy, Privacy
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Which Phish Is Captured in the Net? Understanding Phishing Susceptibility and Individual Differences
Sarno, Dawn M.; Harris, Maggie W.; Black, Jeffrey – Applied Cognitive Psychology, 2023
Phishing research presents conflicting findings regarding the psychological predictors of phishing susceptibility. The present work aimed to resolve these discrepancies by utilizing a diverse online sample and email set. Participants completed a survey that included an email classification task and measured several individual differences,…
Descriptors: Computer Security, Electronic Mail, Deception, At Risk Persons
Kevin McLaughlin – ProQuest LLC, 2023
The emerging impact of gamification in the field of education has generated several possible avenues for enhancing learning outcomes and raised a large number of as-yet unanswered questions as to the effectiveness of different gamification techniques in different contexts. This quantitative survey study examines the impact of gamification on…
Descriptors: Computer Science Education, Computer Security, Information Security, Game Based Learning
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Jamal, Bakht; Rizvi, Syed Asad Abbas – Pakistan Journal of Distance and Online Learning, 2023
This paper intended to analyze the practices of digital citizenship among university student in Pakistan. The quantitative descriptive survey research design was adopted for this study. The population of the study was 800 students of BS (Education) program in ten public sector universities in Punjab, Pakistan. Simple random sampling technique was…
Descriptors: Foreign Countries, Technological Literacy, College Students, Computer Use
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Yusuf Kiziltas; Sena Nur Kutluboga – Review of Education, 2025
Social media platforms are entering schools and even classrooms today. Students' early acquaintance with social media platforms brings up the disadvantages and advantages of social media platforms. The use of social media platforms against students and the risks they pose to them place a responsibility on teachers and parents. However,…
Descriptors: Information Dissemination, Sharing Behavior, Elementary School Students, Social Media
Moon, Tyler; Abegaz, Tamirat; Payne, Bryson; Salimi, Abi – Journal of Cybersecurity Education, Research and Practice, 2020
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal…
Descriptors: Information Security, Game Based Learning, Computer Security, Knowledge Level
Aruta, John A.; Schembari, N. Paul – Journal of Cybersecurity Education, Research and Practice, 2020
We describe the results of a master's thesis in malware detection and discuss the connection to the learning goals of the project. As part of the thesis, we studied obfuscation of malware, conversion of files into images, image processing, and machine learning, a process of benefit to both the student and faculty. Malware detection becomes…
Descriptors: Computer Software, Computer Security, Identification, Deception
Feye, K. M.; Lekkala, H.; Lee-Bartlett, J. A.; Thompson, D. R.; Ricke, S. C. – Journal of Food Science Education, 2020
Automation is coming and will enable not only the ability to increase poultry processing line speeds, but also the collection of considerable "big data." These data can be collected "en masse," stored, analyzed, and used to improve food safety, quality, enhance traceability, and also be used for risk assessment. However, as…
Descriptors: College Students, Food, Safety, Computer Literacy
Armstrong, Miriam E.; Jones, Keith S.; Namin, Akbar Siami; Newton, David C. – ACM Transactions on Computing Education, 2020
More specialized cybersecurity education programs are needed to address workforce needs, but it is unclear which knowledge, skills, and abilities (KSAs) fulfil industry needs. We interviewed 48 professionals within four cyber defense specialty areas: (1) Cyber Network Defense Analysis, (2) Cyber Network Defense Infrastructure Support, (3) Incident…
Descriptors: Knowledge Level, Job Skills, Computer Security, Computer Science Education

Peer reviewed
Direct link
