Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 5 |
Descriptor
Source
| Educational Technology &… | 1 |
| Interactive Learning… | 1 |
| International Educational… | 1 |
| Journal of Computing in… | 1 |
| ProQuest LLC | 1 |
Author
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Collected Works - Proceedings | 1 |
| Dissertations/Theses -… | 1 |
| Reports - Descriptive | 1 |
Education Level
| Middle Schools | 5 |
| Elementary Education | 3 |
| Junior High Schools | 3 |
| Secondary Education | 3 |
| Grade 6 | 1 |
| Grade 7 | 1 |
| Grade 8 | 1 |
| Higher Education | 1 |
| Intermediate Grades | 1 |
| Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
James J. Meadows III – ProQuest LLC, 2023
The purpose of this exploratory qualitative study was to explore the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. My study addressed whether security training for teenagers will solve the…
Descriptors: Middle School Students, Public Schools, Gamification, Educational Games
Kirkham, Thomas; Winfield, Sandra; Smallwood, Angela; Coolin, Kirstie; Wood, Stuart; Searchwell, Louis – Educational Technology & Society, 2009
This paper presents a platform on which a new generation of applications targeted to aid the self-organised learner can be presented. The new application is enabled by innovations in trust-based security of data built upon emerging infrastructures to aid federated data access in the UK education sector. Within the proposed architecture, users and…
Descriptors: Architecture, Learning Processes, Foreign Countries, Educational Technology
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection
Wright, Vivian H.; Burnham, Joy J.; Inman, Christopher T.; Ogorchock, Heather N. – Journal of Computing in Teacher Education, 2009
This study examined cyberbullying in three distinct phases to facilitate a multifaceted understanding of cyberbullying. The phases included (a) a quantitative survey, (b) a qualitative focus group, and (c) development of educational scenarios/simulations (within the Second Life virtual environment). Phase III was based on adolescent feedback about…
Descriptors: Prevention, Focus Groups, Virtual Classrooms, Bullying

Peer reviewed
Direct link
