Publication Date
In 2025 | 25 |
Since 2024 | 163 |
Since 2021 (last 5 years) | 423 |
Since 2016 (last 10 years) | 647 |
Since 2006 (last 20 years) | 1225 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Tosun, Nilgün – Journal of Education and Training Studies, 2018
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Social Media
The Relationships of Social Cognitive Career Theory Factors and Cybersecurity Research Self-Efficacy
Chong, Rylan C. – ProQuest LLC, 2018
The purpose of this study was to investigate the relationships of social cognitive career theory factors of past performance, verbal persuasion, vicarious experience, outcome expectancy, interest, and former students' cybersecurity research self-efficacy; and examine whether the relationships were different among gender, academic classification,…
Descriptors: Social Cognition, Computer Security, Self Efficacy, Undergraduate Students
Hodge, Timothy D. – ProQuest LLC, 2018
The Department of Defense (DoD), like most very large organizations rightly have concerns over the functionality of their Cybersecurity employees and their ability to perform core duties in a professional manner. To validate this ability, the DoD imposed a mandatory certifications policy based upon positions within the organization. The DoD…
Descriptors: Public Agencies, Government Employees, Computer Security, Outcomes of Education
Payne, Brian K.; Vandecar-Burdin, Tancy; Cigularova, Daniela – NACADA Journal, 2022
In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the…
Descriptors: Information Security, Information Technology, Community Colleges, College Faculty
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Pitman, Lora; Payne, Brian K.; Vandecar-Burdin, Tancy; Thorbjornsen, Lenora – Journal of Cybersecurity Education, Research and Practice, 2022
As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across…
Descriptors: College Students, STEM Education, Computer Security, Information Security
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising
Tsado, Lucy – Journal of Cybersecurity Education, Research and Practice, 2019
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not…
Descriptors: Information Security, National Security, Computer Security, Computer Science Education
Tinmaz, Hasan; Lee, Jin Hwa – Participatory Educational Research, 2019
As the communication and information technologies (especially mobile devices) have become a central part of our daily lives, people have started to bring their own devices to schools, universities, companies and other types of organizations. Bearing in mind the difficulty of stopping people from carrying these devices, Bring Your Own Device (BYOD)…
Descriptors: Foreign Countries, Educational Technology, Technology Uses in Education, Ownership
Choi, Ikkyu; Hao, Jiangang; Deane, Paul; Zhang, Mo – ETS Research Report Series, 2021
"Biometrics" are physical or behavioral human characteristics that can be used to identify a person. It is widely known that keystroke or typing dynamics for short, fixed texts (e.g., passwords) could serve as a behavioral biometric. In this study, we investigate whether keystroke data from essay responses can lead to a reliable…
Descriptors: Accuracy, High Stakes Tests, Writing Tests, Benchmarking
Pérez-Escoda, Ana; Lena-Acebo, Francisco Javier; García-Ruiz, Rosa – Digital Education Review, 2021
Networked society before pandemic situation had become the context of a technology-supported environment for learning and teaching. Since COVID-19 pandemic occurred learning happened essentially mediated through connected smart devices that demand digital skills and reinforced Smart learning. This study aims to present a descriptive and…
Descriptors: Foreign Countries, COVID-19, Pandemics, Educational Technology
Piety, Philip J. – Grantee Submission, 2021
The paper discusses the use of "Productive Disciplinary Engagement" (PDE) for a curricular project that features a technology-based alternate reality game (ARG) with the objective of teaching undergraduate students about the collaborative nature of STEM careers. Much of the PDE research uses PDE as either a design-principle or as an…
Descriptors: Educational Technology, Technology Uses in Education, Undergraduate Students, Educational Games
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Bates, Justin D. – ProQuest LLC, 2017
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
Descriptors: Information Technology, Information Security, Professional Personnel, Certification
Bohler, Jeffrey A.; Larson, Benjamin; Peachey, Todd A.; Shehane, Ronald F. – Journal of Information Systems Education, 2020
Information systems education objectives must continually adapt to a dynamic marketplace for knowledge and skills. For faculty developing programs that better prepare students for this demanding environment, existing research and guidelines provide a foundation to develop relevant coursework. However, an examination of peer institutions indicates…
Descriptors: Information Systems, Computer Science Education, Curriculum Evaluation, Guidelines