Publication Date
| In 2026 | 1 |
| Since 2025 | 71 |
| Since 2022 (last 5 years) | 388 |
| Since 2017 (last 10 years) | 660 |
| Since 2007 (last 20 years) | 1212 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Christine Wusylko | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 44 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 29 |
| Turkey | 23 |
| Canada | 22 |
| Texas | 22 |
| California | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| China | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Matthew L. McFadden – ProQuest LLC, 2021
Identifying and cultivating cybersecurity leaders is paramount to building and strengthening the cybersecurity workforce. These skilled cybersecurity leaders are critical for leading effective cybersecurity teams and defending organizations against ever-increasing cyber threats. This research study analyzed cybersecurity professionals' preparation…
Descriptors: Internet, Computer Security, Leadership Training, Professional Personnel
Jirong Yi – ProQuest LLC, 2021
We are currently in a century of data where massive amount of data are collected and processed every day, and machine learning plays a critical role in automatically processing the data and mining useful information from it for making decisions. Despite the wide and successful applications of machine learning in different fields, the robustness of…
Descriptors: Artificial Intelligence, Algorithms, Data, Classification
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
State Educational Technology Directors Association, 2022
Many districts struggle to access the cybersecurity expertise or other resources needed to secure their networks and data appropriately. This isn't because mitigation strategies don't exist. Often, the barrage of suggestions and warnings directed at school IT leaders are too overwhelming to navigate, are not properly scoped for educational…
Descriptors: Computer Security, Information Security, Privacy, Elementary Secondary Education
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
Moorefield-Lang, Heather – Knowledge Quest, 2020
Digital citizenship is defined as the responsible and appropriate behavior in technology and online use. This behavior can also include digital or online etiquette, ethics, and security. With online bullying and cyber safety a continuous concern, teaching students to be responsible and aware digital citizens is imperative (Phillips and Lee 2019).…
Descriptors: Computer Use, Internet, Social Behavior, Death
Hong, Wilson Cheong Hin; Chi, ChunYang; Liu, Jia; Zhang, YunFeng; Lei, Vivian Ngan-Lin; Xu, XiaoShu – Education and Information Technologies, 2023
A multitude of studies have suggested potential factors that influence internet security awareness (ISA). Some, for example, used GDP and nationality to explain different ISA levels in other countries but yielded inconsistent results. This study proposed an extended knowledge-attitude-behaviour (KAB) model, which postulates an influence of the…
Descriptors: Foreign Countries, College Students, College Graduates, Employment
Ramezan, Christopher A. – Journal of Information Systems Education, 2023
While demand for cybersecurity professionals is high, the field is currently facing a workforce shortage and a skills gap. Thus, an examination of current cybersecurity position hiring requirements may be advantageous for helping to close the skills gap. This work examines the education, professional experience, industry certification, security…
Descriptors: Computer Security, Information Technology, Job Skills, Digital Literacy
Sisi Long; Ting Zhu; Xizi Chen – Digital Education Review, 2023
Problematic Internet use (PIU) can lead to dysfunction and undesired consequences, especially in adolescents and youths. Studies have shown that personal emotional characteristics and relationships with others are associated with PIU. We pursue the neglected question of whether there is a correlation between personal ability, such as new media…
Descriptors: Internet, Media Literacy, College Students, Gender Differences
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Malone, Mac – ProQuest LLC, 2023
We analyze the thesis that a fully immersive gamified learning platform benefits students, improving their enjoyment, time management, and performance by engaging them with the subject matter. We assert that an immersive experience centered around a true game produces better results than exercises with just a few gamified elements (e.g., points,…
Descriptors: Game Based Learning, Teaching Methods, Time Management, Learner Engagement
Childs, Dawn – ProQuest LLC, 2023
Cyberattacks in the United States have consistently increased over recent years, and there is no apparent end to this upward trend. The increase in these attacks has resulted in successful cyber incidents and breaches of large, small, and medium-sized organizations across varied locales and industries. The hospitality industry has not been immune…
Descriptors: Hospitality Occupations, Professional Education, Curriculum, Computer Security
Jenay Robert; Nicole Muscanell; Mark McCormack; Kathe Pelletier; Kim Arnold; Nichole Arbino; Keturah Young; Jamie Reeves – EDUCAUSE, 2025
Higher education is in a period of massive transformation and uncertainty. Not only are current events impacting how institutions operate, but technological advancement--particularly in AI and virtual reality--are reshaping how students engage with content, how cognition is understood, and how learning itself is documented and valued. Our newly…
Descriptors: Higher Education, Educational Trends, Educational Technology, Artificial Intelligence
Berrin Yanikkaya, Editor; Michael Gaebel, Editor; Gohar Hovhannisyan, Editor – European University Association, 2025
This report summarises the findings of the 2024 EUA Learning & Teaching Thematic Peer Group on 'Learning and teaching in situations of crisis: needs and support provision'. The group explored how crises--ranging from pandemics and natural disasters to political interference, armed conflicts and technological disruptions--affect higher…
Descriptors: Higher Education, Educational Practices, Pandemics, COVID-19

Direct link
Peer reviewed
