Publication Date
In 2025 | 20 |
Since 2024 | 156 |
Since 2021 (last 5 years) | 416 |
Since 2016 (last 10 years) | 640 |
Since 2006 (last 20 years) | 1218 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Valdes, Edgar – ProQuest LLC, 2022
The aim of this study is to understand the Tor browser and its multiple applications as related to cybersecurity. The study also argues that most internet users are not aware of the danger they face when navigating the dark web. This research explores top executives' and specialized employees' awareness and understating of the hidden areas of…
Descriptors: Foreign Countries, Computer Security, Internet, Crime
Caramancion, Kevin Matthe – ProQuest LLC, 2022
Misinformation and Disinformation, both types of Information Disorder in the cyber world, operate on a systemic level. Several factors enabling their persistence, including laws, policies, and technological mediators, have been investigated in the literature. Cybersecurity frameworks and guidelines specify that the target victims, as part of the…
Descriptors: Interdisciplinary Approach, Information Literacy, Consciousness Raising, Computer Security
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Howell, Ashley – Advanced Distributed Learning Initiative, 2022
A federated Enterprise Learner Record Repository (ELRR) provides the ability to look across many distributed learner records as if they were from a single source and enables the sharing of local and global learner data across the DoD. This learner data will be pulled from authoritative sources for publishing, customizing, and harmonizing…
Descriptors: Student Records, Training, Computer Uses in Education, Computer Security
Feray Küçükbas Duman – European Journal of Education (EJED), 2022
The most practical and fastest way to access information in today's world is via the internet. Thanks to the internet, the necessary information can be reached in a short time. Nevertheless, in addition to the benefits of the internet, it can also pose risks for users. For this reason, it is important to increase the level of awareness of…
Descriptors: Undergraduate Students, Physical Education, Student Behavior, Internet
Keith A. Jordan – ProQuest LLC, 2022
Despite significant cybersecurity policy, a prioritization of funding, and increased cybersecurity workforce training, DoD operational testers continue to find critical cyber vulnerabilities in its Weapon and Control Systems that result in the warfighter's lack of ability to "fight through" when faced with a cyber-contested environment…
Descriptors: Training, Computer Security, Government (Administrative Body), Government Employees
Chaimae Tnibar-Harrus; María José Latorre-Medina – Excellence in Education Journal, 2025
The purpose of this study was to analyze digital competencies of student teachers in Early Childhood Education and Primary Education of the Faculty of Education, Economy and Technology of Ceuta of the University of Granada. Specifically, we investigated the degree of competence in digital ethics that future teachers acquire, develop and/or enhance…
Descriptors: Ethics, Technological Literacy, Early Childhood Teachers, Elementary School Teachers
Hendrickson, Peggy Bell – College and University, 2021
This article is the second of a two-part series on best practices in receiving digital documents. Part I focused on national databases, third-party digital repositories, institutional websites, and certified documents. Part II looks at a problematic and prevalent of digital records options: email attachments. It discusses the security of email and…
Descriptors: Electronic Mail, Computer Security, Computer Uses in Education, Information Management
Boyce, Stephen – ProQuest LLC, 2021
The world continues to be plagued by cyber incidents that impact businesses, schools, hospitals, and government institutions. Some organizations have given cybersecurity a line item on the annual budget, while others have created dedicated departments to improve their technical defenses. Executive boards and C-level executives have shifted from an…
Descriptors: Demography, Decision Making, Computer Security, Undergraduate Students
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
M. Claire Buchan; Jasmin Bhawra; Tarun Reddy Katapally – Smart Learning Environments, 2024
The rapid expansion of digital connectivity has provided youth with wide-ranging access to digital platforms for communication, entertainment, and education. In light of this profound shift, there have been growing concerns about online safety, data privacy, and cybersecurity. A critical factor influencing the ability of youth to responsibly…
Descriptors: Digital Literacy, Program Implementation, Measures (Individuals), Foreign Countries
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach