Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 4 |
Descriptor
| Computer Networks | 4 |
| Privacy | 4 |
| Computer Security | 3 |
| Computer Science Education | 2 |
| Foreign Countries | 2 |
| Access to Education | 1 |
| Access to Internet | 1 |
| Age Differences | 1 |
| COVID-19 | 1 |
| College Students | 1 |
| Computer Mediated… | 1 |
| More ▼ | |
Source
| Educational Process:… | 1 |
| Journal of Cybersecurity… | 1 |
| Perspectives in Education | 1 |
| State Education Standard | 1 |
Author
| Fazlyn Petersen | 1 |
| Jinghua Zhang | 1 |
| Jinsheng Xu | 1 |
| Kelvin Bryant | 1 |
| Kevin Hilliard | 1 |
| Khanittha Sittitiamjan | 1 |
| Pongpisit Wuttidittachotti | 1 |
| Reg Leichty | 1 |
| Xiaohong Yuan | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Reports - Descriptive | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| South Africa | 1 |
| Thailand | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Fazlyn Petersen – Perspectives in Education, 2025
In times of increasing civil unrest and displacement, ensuring the continuity of education necessitates innovative solutions. This article advocates for the use of data-free applications to prevent educational exclusion. It examines the challenges faced by displaced and marginalised students, including disrupted educational infrastructure, limited…
Descriptors: Computer Software, Access to Education, Social Justice, Disadvantaged

Peer reviewed
Direct link
