Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 5 |
| Since 2007 (last 20 years) | 8 |
Descriptor
Source
| ProQuest LLC | 2 |
| Association Supporting… | 1 |
| European Union | 1 |
| International Journal of… | 1 |
| Journal of Adult and… | 1 |
| Journal of Computers in… | 1 |
| Journal on Educational… | 1 |
Author
| Adrian Curaj | 1 |
| Alina Iura | 1 |
| Cezar Hâj | 1 |
| Cosmin Holeab | 1 |
| Dorin Cote? | 1 |
| Greitzer, Frank L. | 1 |
| Huston, Kristy | 1 |
| Irina Geanta | 1 |
| James Johnston | 1 |
| Karjalainen, Mika | 1 |
| Kim, Philip | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Dissertations/Theses -… | 2 |
| Collected Works - Proceedings | 1 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
Education Level
| Adult Education | 8 |
| Higher Education | 3 |
| Postsecondary Education | 3 |
| Early Childhood Education | 1 |
| Elementary Secondary Education | 1 |
| Preschool Education | 1 |
Audience
Location
| Czech Republic | 1 |
| European Union | 1 |
| Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tereza Hannemann; Nikol Kopánková; Petra Surynková – Journal of Adult and Continuing Education, 2025
In today's world, having at least basic digital skills is essential in working, social, and family life. The present study uses grounded theory to explore ways in which people with little formal schooling engage with the digital world. Drawing on 54 semi-structured interviews, it describes how people with little IT experience from formal education…
Descriptors: Adult Students, Technological Literacy, Computer Security, Information Security
Karjalainen, Mika; Ojala, Anna-Liisa; Vatanen, Marko; Lötjönen, Jarno – International Journal of Adult Education and Technology, 2022
This qualitative study includes nine semi-structured interviews with cybersecurity experts from different security-related organizations who are familiar with cybersecurity exercises. Its contribution to cybersecurity workforce development focuses on organizational learning rather than individual skills development and relevant competencies. It…
Descriptors: Computer Security, Computer Science Education, Organizational Learning, Skill Development
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Adrian Curaj; Cezar Hâj; Cosmin Holeab; Irina Geanta; Alina Iura; Dorin Cote?; Oana ?în?ar – European Union, 2025
The present report overseen by the Executive Agency for Higher Education, Research, Development and Innovation Funding (UEFISCDI) on behalf of the European Commission and the European Education and Culture Executive Agency as part of the contract for the implementation of the European Digital Education Hub, is the third report in a series…
Descriptors: Foreign Countries, Educational Innovation, Electronic Learning, Educational Practices
Oliver, Kevin – Journal of Computers in Mathematics and Science Teaching, 2016
This paper presents the results of a comparison study between graduate students taking a software security course at an American university and international working professionals taking a version of the same course online through a free massive open online course (MOOC) created in the Google CourseBuilder learning environment. A goal of the study…
Descriptors: Computer Science Education, Online Courses, Graduate Students, Continuing Education
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Kim, Philip – ProQuest LLC, 2010
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
Descriptors: Financial Services, Knowledge Level, Transfer of Training, Computer Security
Greitzer, Frank L.; Kuchar, Olga Anna; Huston, Kristy – Journal on Educational Resources in Computing, 2007
Serious games use entertainment principles, creativity, and technology to meet government or corporate training objectives, but these principles alone will not guarantee that the intended learning will occur. To be effective, serious games must incorporate sound cognitive, learning, and pedagogical principles into their design and structure. In…
Descriptors: Training Objectives, Educational Technology, Educational Principles, Design Requirements

Peer reviewed
Direct link
