NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20254
Since 2022 (last 5 years)9
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Damjan Fujs; Simon Vrhovec; Tomaž Hovelja; Damjan Vavpotic – Education and Information Technologies, 2025
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the…
Descriptors: Foreign Countries, Older Adults, Digital Literacy, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Alison Lui; Catharina Womack; Penny Orton – Education and Information Technologies, 2025
This article critically evaluates the effects of the ACU Virtual Mobility (VM) Project Digital Information Security Course (DISC) programme on improving students' awareness of cyber security skills, pre and post the educational intervention. Our selected VM tool is Collaborative Online International Learning (COIL). Building on a conceptual…
Descriptors: Cooperative Learning, Electronic Learning, Foreign Countries, Information Security
Emeka Ejikeme – ProQuest LLC, 2023
The U.S. National Institute of Standards and Technology (NIST) identified that approximately 1.8 million cybersecurity positions were vacant in 2021 because of a lack of professionals with the required skill sets and who remained in their jobs long enough to contribute to their organizations' cybersecurity needs. Also shown was the rising global…
Descriptors: Best Practices, Computer Security, College Graduates, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Ruta Pirta-Dreimane; Agne Brilingaite; Evita Roponena; Karen Parish; Janis Grabis; Ricardo Gregorio Lugo; Martinš Bonders – Technology, Knowledge and Learning, 2025
Incorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk…
Descriptors: Computer Security, Computer Science Education, Educational Games, Gamification
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising