NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 202547
Publication Type
Reports - Research47
Journal Articles45
Tests/Questionnaires8
Information Analyses3
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 47 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Mahao Mahao; Julia Chere-Masopha – Discourse and Communication for Sustainable Education, 2025
Digital literacy has become crucial for functionality and productivity in academics, work, and everyday community lives. However, easy access to digital technologies, accompanied by limited digital literacy, can expose users to the dangers that lurk in the digital world. Young people, who are frequent users of these technologies yet have less…
Descriptors: Student Teachers, Student Attitudes, Computer Security, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oumaima Ouadoud; Tarik Chafiq; Ahmed Eddaoui – Educational Process: International Journal, 2025
Background/purpose. This research was conducted to address the growing need for more secure, transparent, and efficient solutions for the issuance and management of university degrees. The main purpose of the study is to evaluate which Blockchains are best suited for this application, aiming to enhance the reliability and speed of degree-related…
Descriptors: Academic Degrees, Technology Uses in Education, Computer Security, Academic Records
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dariusz Witko; Yair Levy; Catherine Neubauer; Gregory Simco; Laurie P. Dringus; Melissa Carlton – Journal of Cybersecurity Education, Research and Practice, 2025
The increasing volume of cyber threats, combined with a critical shortage of skilled professionals and rising burnout among practitioners, highlights the urgent need for innovative solutions in cybersecurity operations. Generative Artificial Intelligence (GenAI) offers promising potential to augment human analysts in cybersecurity, but its…
Descriptors: Computer Security, Competence, Artificial Intelligence, Expertise
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Peer reviewed Peer reviewed
Direct linkDirect link
Kaie Maennel; Olaf Maennel – ACM Transactions on Computing Education, 2025
The human aspects of cyber security are fundamental as these are interlinked with processes and technology in building resilience against an evolving and complex threat landscape. It is vital to teach future cyber security specialists sufficient knowledge about human aspects in order to strengthen the defences and defend against malicious actors.…
Descriptors: Computer Security, Computer Science Education, College Curriculum, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Tang Wee Teo; Sherwin John San Buenaventura Mabulo; Kim Chwee Daniel Tan; Jin Xin Matilda Ho; Xue Xian Thea Tan – Journal of Science Education and Technology, 2025
STEM (science, technology, engineering, mathematics) hackathons have been conducted to offer opportunities for diverse participants to work collaboratively and intensely on tasks within a short period. However, most literature about hackathons does not offer theoretical discussions on the affordances of such learning contexts for school students.…
Descriptors: Epistemology, STEM Education, Computer Security, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Kara Dawson; Zhen Xu; Pavlo Antonenko; DoHyong Koh – Journal of Science Education and Technology, 2025
Online professional development (OPD) is a popular professional learning option, especially for those with monetary and time constraints such as afterschool educators. This study reports on the design, implementation, and evaluation of an OPD on preparing 18 afterschool educators to teach a content-heavy, transmedia, STEM curriculum on cryptology…
Descriptors: Online Courses, Faculty Development, After School Programs, STEM Education
Peer reviewed Peer reviewed
Direct linkDirect link
Damjan Fujs; Simon Vrhovec; Tomaž Hovelja; Damjan Vavpotic – Education and Information Technologies, 2025
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the…
Descriptors: Foreign Countries, Older Adults, Digital Literacy, Computer Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ajibola Omoniyi Victor; Hamimah Ujir – Journal of Education and Learning (EduLearn), 2025
Information and communication technology (ICT) has become an essential part of the daily lives of tertiary students. However, research into assessing digital competency and its effects on academic performance is still limited. This paper explores students' needs for digital competence, the impact of digital access on academic performance, and the…
Descriptors: Foreign Countries, Undergraduate Students, Digital Literacy, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oralbek Yskak; Natalya Seitakhmetova; Sholpan Zhandossova; Marhabbat Nurov – Journal of Social Studies Education Research, 2025
Digital transformation is reshaping social and economic relations through the adoption of digital technologies, playing a crucial role in Kazakhstan's modernization and economic diversification. This study aims to comprehensively analyze the multifaceted process of digital transformation in Kazakhstan, with a particular emphasis on identifying…
Descriptors: Foreign Countries, Mathematical Models, Information Technology, Professional Personnel
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brendan Bertone; Paul Wagner; Joshua Pauli – Journal of Cybersecurity Education, Research and Practice, 2025
The cybersecurity profession continues to face a significant shortfall of qualified professionals despite steady growth in degree programs. Employers consistently cite experience as the main barrier for entrylevel cybersecurity hires. This paper argues that clinic-based experiential learning offers a scalable solution to that preparation gap. A…
Descriptors: Computer Science Education, Computer Security, Experiential Learning, Conventional Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
R. Ravichandran; Sonam Singh; P. Sasikala – Journal of Cybersecurity Education, Research and Practice, 2025
This study investigates the awareness and practices of cyber security among school teachers, exploring their understanding of cyber threats, online behaviours, and response mechanisms to cyber incidents. A structured questionnaire was administered to gather data on demographic information, cyber security training, online practices, and experiences…
Descriptors: Computer Security, Information Security, Teacher Characteristics, Training
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gina Childers; Weverton Ataide Pinheiro; Oluwatosin Daramola; C. Lindsay Linsky; Bryson Payne; Jack Byers; Daniel Baker – Journal of Cybersecurity Education, Research and Practice, 2025
Because K-12 teachers have access to private educational data, they are increasingly at risk of being affected by cybersecurity threats. Examining how teachers conceptualize cybersecurity is vital so that cybersecurity training can be tailored to teachers' understanding of cybersecurity. This study examined K-12 teachers' (n = 255) personalized…
Descriptors: Teacher Attitudes, Knowledge Level, Definitions, Computer Security
Jenay Robert – EDUCAUSE, 2025
In the "2024 EDUCAUSE Horizon Report: Cybersecurity and Privacy Edition," a panel of experts agreed that a key practice for advancing the future of higher education cybersecurity and privacy is supporting agency, trust, transparency, and involvement among stakeholders. In fact, these are such important topics for the higher education…
Descriptors: Higher Education, Futures (of Society), Educational Trends, Trust (Psychology)
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4