Publication Date
In 2023 | 3 |
Since 2022 | 35 |
Since 2019 (last 5 years) | 135 |
Since 2014 (last 10 years) | 205 |
Since 2004 (last 20 years) | 242 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Policymakers | 6 |
Administrators | 4 |
Parents | 1 |
Teachers | 1 |
Location
Maryland | 9 |
Texas | 7 |
United States | 7 |
Florida | 6 |
New York | 5 |
Massachusetts | 4 |
United Kingdom | 4 |
Virginia | 4 |
Australia | 3 |
California | 3 |
China | 3 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 5 |
Civil Rights Act 1964 | 1 |
Coronavirus Aid Relief and… | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Daengsi, Therdpong; Pornpongtechavanich, Phisit; Wuttidittachotti, Pongpisit – Education and Information Technologies, 2022
Cybersecurity is crucial at present because cyber threats (e.g., phishing) have become a very common occurrence in everyday life. A literature review showed that there are no studies based on cybersecurity awareness which involved a large number of Thai users. Thus, this research focused on the cybersecurity awareness of approximately 20,000…
Descriptors: Information Security, Computer Security, Employees, Finance Occupations
Payne, Brian K.; Cross, Bria; Vandecar-Burdin, Tancy – Journal of Cybersecurity Education, Research and Practice, 2022
The value of academic advising has been increasingly emphasized in higher education. In this study, attention is given to the most significant types of advice that a sample of cybersecurity faculty and advisors from the Commonwealth of Virginia recommend giving to cybersecurity students. The results show that faculty and advisors recommended that…
Descriptors: Faculty Advisers, Academic Advising, Computer Security, Experience
Poulsen, Seth; Herman, Geoffrey L.; Peterson, Peter A. H.; Golaszewski, Enis; Gorti, Akshita; Oliva, Linda; Scheponik, Travis; Sherman, Alan T. – ACM Transactions on Computing Education, 2022
We present a psychometric evaluation of a revised version of the "Cybersecurity Concept Inventory" ("CCI"), completed by 354 students from 29 colleges and universities. The CCI is a conceptual test of understanding created to enable research on instruction quality in cybersecurity education. This work extends previous expert…
Descriptors: Psychometrics, Computer Security, Measures (Individuals), Computer Science Education
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Dawson, Kara; Antonenko, Pavlo; Xu, Zhen; Wusylko, Christine; Koh, Do Hyong – Journal of Technology and Teacher Education, 2022
K-12 teachers and students are vulnerable to cybersecurity attacks and mostly ill-prepared to deal with them. The COVID-19 pandemic has only increased these risks because of the reliance on digital technology in education and increased free time young children and adolescents spend online. Simultaneously, the U.S. is facing an extreme shortage of…
Descriptors: Preservice Teacher Education, Computer Security, Information Security, Knowledge Level
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Rice, Jeffrey Philip – ProQuest LLC, 2021
Using the lived experiences of study participants, the purpose of the exploratory qualitative study was to explore collegiate cybersecurity instructors' qualities needed to maximize the engagement of Generation Z cybersecurity learners to successfully become cybersecurity specialists. This understanding is important in order to increase the…
Descriptors: Information Security, Computer Security, Age Groups, Specialists
Yang, Samuel C. – Journal of Education for Business, 2021
Business schools can meet the increasingly multidisciplinary requirements of training cybersecurity professionals. But in developing curriculums, they face different cybersecurity curricular frameworks with diverse emphases. Using a meta-framework consisting of a 2x3 model and a 2x2 model, this study examines ten cybersecurity curricular…
Descriptors: Computer Security, Information Security, Business Administration Education, Curriculum Development
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security
Payne, Brian K.; Mayes, Lisa; Paredes, Tisha; Smith, Elizabeth; Wu, Hongyi; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university's undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and…
Descriptors: Interdisciplinary Approach, Information Security, Computer Security, Information Science Education
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
Workman, Michael D.; Luevanos, J. Anthony; Mai, Bin – IEEE Transactions on Education, 2022
Contribution: Based on a previous exploratory study, this research further investigated learning mode contributions from simulations and live competitive activities compared to a traditional classroom, laboratory, and testing approach to instruction in order to assess the applied behavioral contributions of each. Background: Cybersecurity…
Descriptors: Computer Security, Information Security, Computer Science Education, Simulation
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Kraus, Lydia – Education and Information Technologies, 2022
Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating…
Descriptors: Data Use, Learning Analytics, Information Security, Training