Publication Date
| In 2024 | 89 |
| Since 2023 | 186 |
| Since 2020 (last 5 years) | 385 |
| Since 2015 (last 10 years) | 586 |
| Since 2005 (last 20 years) | 1191 |
Descriptor
| Computer Security | 1497 |
| Internet | 458 |
| Information Technology | 415 |
| Information Security | 410 |
| Computer Software | 251 |
| Computer Networks | 241 |
| Foreign Countries | 241 |
| Privacy | 241 |
| Higher Education | 232 |
| Educational Technology | 205 |
| Computer Science Education | 179 |
| More ▼ | |
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 39 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Students | 11 |
| Parents | 10 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 28 |
| United States | 28 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| Turkey | 18 |
| Maryland | 16 |
| Florida | 14 |
| China | 13 |
| North Carolina | 13 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment
Amy Esther Kuiken – ProQuest LLC, 2024
The cybersecurity landscape in the United States has rapidly evolved, marked by risk and novel threats (Georgescu, 2021; Siraj et al., 2021). Today, security mindsets are "widely accepted in the computer security community as … essential … for successful cybersecurity practice" (Peterson, 2021, para. 1), valuable to aspiring…
Descriptors: Second Language Learning, Second Language Instruction, Information Security, Computer Security
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Vekaria, Komal Bhupendra; Calyam, Prasad; Wang, Songjie; Payyavula, Ramya; Rockey, Matthew; Ahmed, Nafis – IEEE Transactions on Learning Technologies, 2021
There is an increasing trend in cloud adoption of enterprise applications in, for example, manufacturing, healthcare, and finance. Such applications are routinely subject to targeted cyberattacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to…
Descriptors: Computer Security, Training, Crime Prevention, Information Technology
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Lee, Heesuk – ProQuest LLC, 2022
Many organizations are providing employee training to raise security awareness as data breaches increase. Organizational digital transformation has accelerated, especially during the COVID-19 outbreak. It has made the technology industry a prime target for cyberattacks. Although more organizations invest in cybersecurity training, data breaches…
Descriptors: Information Technology, Information Security, Employee Attitudes, Knowledge Level
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Raju, Rajeswari; Abd Rahman, Nur Hidayah; Ahmad, Atif – Asian Journal of University Education, 2022
As COVID-19 took hold, online learning became the norm as universities and classrooms worldwide were forced to close their doors. Education institute closures impacted more than 1.2 billion students across 186 countries as of April 2020. This pandemic, too, has shifted our Malaysian education sector as well. Academicians and students are adopting…
Descriptors: Foreign Countries, Computer Security, Knowledge Level, College Students
Shapna Sultana Pal – ProQuest LLC, 2022
Educators of graduate cybersecurity education lack decision methodologies to aid in selecting and prioritizing cybersecurity criteria and tools to provide hands-on learning in cyber courses. Educators are challenged with keeping the cybersecurity tools in the education curriculum relevant and updated. The risk of not doing so, is possibly…
Descriptors: Computer Security, Information Security, Computer Science Education, Decision Making
Tan, Zheyu; Beuran, Razvan; Hasegawa, Shinobu; Jiang, Weiwei; Zhao, Min; Tan, Yasuo – Education and Information Technologies, 2020
Cybersecurity is no longer an issue discussed only between the professionals or technologists, but it is also closely related to ordinary people whose daily life is exposed to kinds of cyberattacks. And Womabat Security Technologies conducted a survey revealed that ransomware is an unknown concept to nearly two-thirds of employees. In practical,…
Descriptors: Computer Security, Information Security, Training, Computer Assisted Instruction
Modesti, Paolo – Informatics in Education, 2020
As the number of software vulnerabilities discovered increases, the industry is facing difficulties to find specialists to cover the vacancies for security software developers. Considering relevant teaching and learning theories, along with existing approaches in software security education, we present the pedagogic rationale and the concrete…
Descriptors: Computer Security, Computer Software, Computer Science Education, Programming
Pinchot, Jamie; Cellante, Donna; Mishra, Sushma; Paullet, Karen – Information Systems Education Journal, 2020
The cybersecurity industry is facing a significant shortage of professionals to fill open positions, with a projected staffing shortage of 1.8 million jobs worldwide by 2022. Part of this shortage can be attributed to the underrepresentation of women in the field. This research addresses the gender gap in cybersecurity by exploring the perceptions…
Descriptors: Student Attitudes, Barriers, Mentors, Computer Security
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology

Peer reviewed
Direct link
