Publication Date
| In 2026 | 0 |
| Since 2025 | 54 |
| Since 2022 (last 5 years) | 281 |
| Since 2017 (last 10 years) | 445 |
| Since 2007 (last 20 years) | 500 |
Descriptor
Source
Author
| Payne, Brian K. | 6 |
| Marquardson, Jim | 5 |
| Christine Wusylko | 4 |
| Zhen Xu | 4 |
| Celeda, Pavel | 3 |
| Fitzgerald, Brian K. | 3 |
| Jones, Keith S. | 3 |
| Paul Wagner | 3 |
| Vandecar-Burdin, Tancy | 3 |
| Vykopal, Jan | 3 |
| Yang, Samuel C. | 3 |
| More ▼ | |
Publication Type
Education Level
Location
| Texas | 13 |
| United States | 11 |
| Maryland | 10 |
| Florida | 9 |
| New York | 8 |
| Massachusetts | 7 |
| Turkey | 7 |
| United Kingdom | 7 |
| Virginia | 6 |
| Australia | 5 |
| China | 5 |
| More ▼ | |
Laws, Policies, & Programs
| Family Educational Rights and… | 6 |
| Civil Rights Act 1964 | 1 |
| Coronavirus Aid Relief and… | 1 |
| Health Insurance Portability… | 1 |
| Universal Declaration of… | 1 |
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Paul Wagner; Melissa Dark; Robert Honomichl; Filipo Sharevski; Sandra Leiterman – Journal of Cybersecurity Education, Research and Practice, 2025
The increasing prevalence of cybersecurity threats and the shortage of qualified professionals necessitate innovative solutions for cybersecurity education at all levels. Despite the expansion of postsecondary cybersecurity programs, employer dissatisfaction with graduates and a lack of standardized introductory curricula highlights the need for…
Descriptors: Information Security, Computer Security, Computer Science Education, National Security
Gina Childers; Weverton Ataide Pinheiro; Oluwatosin Daramola; C. Lindsay Linsky; Bryson Payne; Jack Byers; Daniel Baker – Journal of Cybersecurity Education, Research and Practice, 2025
Because K-12 teachers have access to private educational data, they are increasingly at risk of being affected by cybersecurity threats. Examining how teachers conceptualize cybersecurity is vital so that cybersecurity training can be tailored to teachers' understanding of cybersecurity. This study examined K-12 teachers' (n = 255) personalized…
Descriptors: Teacher Attitudes, Knowledge Level, Definitions, Computer Security
Raymond Patt; Sotheara Veng; Lien Vu; Chrystalla Mouza; Yan-Ming Chiou; Chien-Chung Shen – Journal of Interactive Learning Research, 2025
Children are increasingly exposed to malicious actors online that could cause digital or even physical harm. Research shows that children know little about cybersecurity, but national organizations are emphasizing cybersecurity education. Practitioners have taught cybersecurity in many ways; however, none have utilized social robots to engage…
Descriptors: Robotics, Elementary School Students, Student Attitudes, Information Security
Noah Glaser; Zeinab Parishani; Amogh Chetankumar Joshi; Prasad Calyam – Technology, Knowledge and Learning, 2025
As Virtual Reality (VR) gains traction in education, its potential to support neurodivergent learners in cybersecurity training remains underexplored. This emerging technology report examines how VR can bridge the gap between STEM education and cybersecurity training for neurodivergent individuals, highlighting both its promise and the challenges…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Science Education, Computer Security
Dhanya Pramod – Journal of Applied Research in Higher Education, 2025
Purpose: The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and…
Descriptors: Gamification, Computer Security, Information Security, Training
Dariusz Witko; Yair Levy; Catherine Neubauer; Gregory Simco; Laurie P. Dringus; Melissa Carlton – Journal of Cybersecurity Education, Research and Practice, 2025
The increasing volume of cyber threats, combined with a critical shortage of skilled professionals and rising burnout among practitioners, highlights the urgent need for innovative solutions in cybersecurity operations. Generative Artificial Intelligence (GenAI) offers promising potential to augment human analysts in cybersecurity, but its…
Descriptors: Computer Security, Competence, Artificial Intelligence, Expertise
Bulbul Ahamed; Mohammad Rashed Hasan Polas; Ahmed Imran Kabir; Abu Saleh Md. Sohel-Uz-Zaman; Abdullah Al Fahad; Saima Chowdhury; Mrittika Rani Dey – SAGE Open, 2024
The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh. A sample of 430 university students from two public and three private universities provided the data in…
Descriptors: Student Empowerment, Information Security, Knowledge Level, College Students
Jacqui Taylor; Monica Whitty – Psychology Learning and Teaching, 2024
We propose that psychology graduates are uniquely placed to work in the cybersecurity industry due to their understanding of human behavior and the possession of skills needed to address cybersecurity issues. However, there are challenges in attracting psychology graduates to the cybersecurity industry as they may not be fully aware of how skills…
Descriptors: Psychology, Majors (Students), Student Attitudes, Literacy
David R. E. Halla – ProQuest LLC, 2024
The study investigated the use of formalized cybersecurity apprenticeships as a means of workforce development to meet the needs of employers seeking to fill cybersecurity positions. The study employed a quantitative analysis using a constructivist grounded theory approach utilizing a survey with questions based on the findings of apprenticeships…
Descriptors: Computer Security, Labor Force Development, Apprenticeships, Models
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Brendan Bertone; Paul Wagner; Joshua Pauli – Journal of Cybersecurity Education, Research and Practice, 2025
The cybersecurity profession continues to face a significant shortfall of qualified professionals despite steady growth in degree programs. Employers consistently cite experience as the main barrier for entrylevel cybersecurity hires. This paper argues that clinic-based experiential learning offers a scalable solution to that preparation gap. A…
Descriptors: Computer Science Education, Computer Security, Experiential Learning, Conventional Instruction
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Mehmet Fatih Yigit – Journal of Learning and Teaching in Digital Age, 2025
Technology, while enhancing efficiency and effectiveness, also poses significant cyber threats and risks. Overcoming these challenges necessitates individuals to have high levels of cybersecurity awareness and to exhibit proper cybersecurity behaviors. Correspondingly, in recent years, the exploration of individual factors influencing…
Descriptors: Metacognition, Computer Security, Information Security, Student Behavior

Peer reviewed
Direct link
