Publication Date
In 2025 | 29 |
Since 2024 | 167 |
Since 2021 (last 5 years) | 427 |
Since 2016 (last 10 years) | 651 |
Since 2006 (last 20 years) | 1229 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Brar, Raj – BU Journal of Graduate Studies in Education, 2022
Social media is an important part of all of our lives. However, there is no requirement for students in Manitoba to receive formalized education in regards to social media and its usage in the K-12 Canadian curriculum instruction. Such formalized education is extremely important for adolescents to understand the multiple facets of social media…
Descriptors: Social Media, Educational Technology, Adolescents, Foreign Countries
Dawson, Kara; Antonenko, Pavlo; Xu, Zhen; Wusylko, Christine; Koh, Do Hyong – Journal of Technology and Teacher Education, 2022
K-12 teachers and students are vulnerable to cybersecurity attacks and mostly ill-prepared to deal with them. The COVID-19 pandemic has only increased these risks because of the reliance on digital technology in education and increased free time young children and adolescents spend online. Simultaneously, the U.S. is facing an extreme shortage of…
Descriptors: Preservice Teacher Education, Computer Security, Information Security, Knowledge Level
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Bulbul Ahamed; Mohammad Rashed Hasan Polas; Ahmed Imran Kabir; Abu Saleh Md. Sohel-Uz-Zaman; Abdullah Al Fahad; Saima Chowdhury; Mrittika Rani Dey – SAGE Open, 2024
The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh. A sample of 430 university students from two public and three private universities provided the data in…
Descriptors: Student Empowerment, Information Security, Knowledge Level, College Students
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Kim, Sang Soo – Interactive Learning Environments, 2023
As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary to explore the motivators and barriers to student engagement comprehensively. Given the nature of an online learning environment, this study specifically focused on security…
Descriptors: Online Courses, Universities, COVID-19, Pandemics
Karagozlu, Damla – Cypriot Journal of Educational Sciences, 2020
As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study…
Descriptors: Preservice Teachers, Computer Security, Information Security, Student Behavior
Alsager, Haroon Nasser – Arab World English Journal, 2020
Numerous studies have been concerned with developing new authorship recognition systems to address the increasing rates of cybercrimes associated with the anonymous nature of social media platforms, which still offer the opportunity for the users not to reveal their true identities. Nevertheless, it is still challenging to identify the real…
Descriptors: Social Media, Semitic Languages, Authors, Computer Security
Liu, Feihong; Tu, Manghui – Journal of Education and Learning (EduLearn), 2020
An educated workforce is essential to government and industry, hence the need to provide a high-quality workforce has been crucial in higher education academic program development. In the cybersecurity field, the situation is not quite satisfactory, the reason comes down to the fact that this new industry is lacking a portable and measurable…
Descriptors: Labor Force Development, Computer Security, College Programs, Computer Science Education
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Tsai, Cheng-Ting; Wu, Ja-Ling; Lin, Yu-Tzu; Yeh, Martin K.-C. – Educational Technology & Society, 2022
With the rapid increase of online learning and online degree programs, the need for a secure and fair scoring mechanisms in online learning becomes urgent. In this research, a secure scoring mechanism was designed and developed based on blockchain technology to build transparent and fair interactions among students and teachers. The proposed…
Descriptors: Electronic Learning, Online Courses, Computer Security, Scoring
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
Sharman, Jonathan; Acemyan, Claudia Ziegler; Kortum, Philip; Wallach, Dan – International Journal of Computer Science Education in Schools, 2021
Software security is inevitably dependent on developers' ability to to design and implement software without security bugs. Perhaps unsurprisingly, developers often fail to do this. Our goal is to understand this from a usability perspective, identifying how we might best train developers and equip them with the right software tools. To this end,…
Descriptors: Teaching Methods, Computer Science Education, Undergraduate Students, Computer Software
Giboney, Justin Scott; McDonald, Jason K.; Balzotti, Jonathan; Hansen, Derek L.; Winters, Desiree M.; Bonsignore, Elizabeth – TechTrends: Linking Research and Practice to Improve Learning, 2021
In this paper we introduce an approach to cybersecurity education and helping students develop professional understanding in the form of a Playable Case Study (PCS), a form of educational simulation that draws on affordances of the broader educational simulation genre, case study instruction, and educational Alternate Reality Games (or ARGs). A…
Descriptors: Computer Security, Computer Simulation, Case Studies, Educational Technology