Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 4 |
Descriptor
Source
| Advances in Engineering… | 1 |
| Association Supporting… | 1 |
| International Educational… | 1 |
| Journal of Computing in… | 1 |
| Techniques: Connecting… | 1 |
Author
Publication Type
| Journal Articles | 3 |
| Collected Works - Proceedings | 2 |
| Reports - Research | 2 |
| Opinion Papers | 1 |
Education Level
| Higher Education | 5 |
| Postsecondary Education | 4 |
| Elementary Education | 1 |
| Grade 6 | 1 |
| Intermediate Grades | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Secondary Education | 1 |
Audience
Location
| Europe | 1 |
| Finland | 1 |
| Florida | 1 |
| France | 1 |
| North America | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Howell, Kevin R. – Techniques: Connecting Education and Careers, 2006
This article features an assistant professor of technology who shares his story of near disaster and offers advice for others about protecting their data. The author presents steps that can be taken to prevent unexpected events from destroying data. The author strongly recommends using backup files as a way of securing computer files and data.…
Descriptors: Computer Security, Data, Computer Software, Computer Peripherals
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection

Peer reviewed
Direct link
