Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 14 |
| Since 2017 (last 10 years) | 22 |
| Since 2007 (last 20 years) | 42 |
Descriptor
Source
Author
| Agne Brilingaite | 1 |
| Ahmed, Nafis | 1 |
| Alakrimi, Mahmoud M. | 1 |
| Allison, Jordan | 1 |
| Alvarez Xochihua, Omar | 1 |
| Asfour, Ali | 1 |
| Bashar, Muhammad Shafi Al | 1 |
| Becker, Kirk | 1 |
| Bo-Yang Shan | 1 |
| Burnham, Joy J. | 1 |
| Calyam, Prasad | 1 |
| More ▼ | |
Publication Type
Education Level
Audience
Location
| Greece | 3 |
| Italy | 3 |
| United Kingdom | 3 |
| Brazil | 2 |
| Estonia | 2 |
| Germany | 2 |
| Mexico | 2 |
| Pennsylvania | 2 |
| Philippines | 2 |
| Portugal | 2 |
| South Korea | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Digital Millennium Copyright… | 1 |
| First Amendment | 1 |
| Health Insurance Portability… | 1 |
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Joshua Hanna – ProQuest LLC, 2023
The rise in cyber-related attacks targeting school districts is outpacing cybersecurity readiness, as education institutions in the USA continue to fall victim to online threats (Levin, 2022). The education industry has been slow to react to an increasingly dangerous security landscape, leading many schools to become prime targets and victims of…
Descriptors: Superintendents, Administrator Attitudes, Administrator Role, Computer Security
Pant, Harsh Vardhan; Lohani, Manoj Chandra; Pande, Jeetendra – Journal of Learning for Development, 2023
In recent years, sentiment analysis has gained popularity among researchers in various domains, including the education domain. Sentiment analysis can be applied to review the course comments in Massive Open Online Courses (MOOCs), which could enable course designers' to easily evaluate their courses. The objective of this study is to explore the…
Descriptors: MOOCs, Course Evaluation, Dropout Attitudes, Student Attitudes
Alakrimi, Mahmoud M. – Online Submission, 2022
The Documentation and Information Department of all Libyan universities is working on developing the university's website to suit all users with their different experiences and ways of interacting, so it is necessary to test the ease of use of these sites. That is why the researcher seeks to evaluate and compare his performance of these sites and…
Descriptors: Universities, Web Sites, Information Dissemination, Foreign Countries
Ruta Pirta-Dreimane; Agne Brilingaite; Evita Roponena; Karen Parish; Janis Grabis; Ricardo Gregorio Lugo; Martinš Bonders – Technology, Knowledge and Learning, 2025
Incorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk…
Descriptors: Computer Security, Computer Science Education, Educational Games, Gamification
Liu, Jinghua; Becker, Kirk – Journal of Educational Measurement, 2022
For any testing programs that administer multiple forms across multiple years, maintaining score comparability via equating is essential. With continuous testing and high-stakes results, especially with less secure online administrations, testing programs must consider the potential for cheating on their exams. This study used empirical and…
Descriptors: Cheating, Item Response Theory, Scores, High Stakes Tests
Vekaria, Komal Bhupendra; Calyam, Prasad; Wang, Songjie; Payyavula, Ramya; Rockey, Matthew; Ahmed, Nafis – IEEE Transactions on Learning Technologies, 2021
There is an increasing trend in cloud adoption of enterprise applications in, for example, manufacturing, healthcare, and finance. Such applications are routinely subject to targeted cyberattacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to…
Descriptors: Computer Security, Training, Crime Prevention, Information Technology
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes
Paiva, José Carlos; Leal, José Paulo; Figueira, Álvaro – ACM Transactions on Computing Education, 2022
Practical programming competencies are critical to the success in computer science (CS) education and go-to-market of fresh graduates. Acquiring the required level of skills is a long journey of discovery, trial and error, and optimization seeking through a broad range of programming activities that learners must perform themselves. It is not…
Descriptors: Automation, Computer Assisted Testing, Student Evaluation, Computer Science Education
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
James J. Meadows III – ProQuest LLC, 2023
The purpose of this exploratory qualitative study was to explore the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. My study addressed whether security training for teenagers will solve the…
Descriptors: Middle School Students, Public Schools, Gamification, Educational Games
Marquardson, Jim – Information Systems Education Journal, 2020
Information systems tools, techniques, and technologies are changing at an ever-increasing pace. Technical skills with operating systems, applications, and hardware are important to learn in an information systems curriculum so that students can be immediately productive upon graduating, but these skills may have a shelf life. Technical skills…
Descriptors: Lifelong Learning, Technology Uses in Education, Information Systems, Independent Study
Green, Nathan; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2020
Finding the first full-time, major-related job is a challenge faced by most college students, particularly those who have not gained much working experience before entering the job market. This challenge is amplified for the students majoring in Information Technology (IT), and cybersecurity in particular, due to the constantly changing technology…
Descriptors: Information Technology, Resumes (Personal), College Graduates, Employment Potential

Peer reviewed
Direct link
