Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 7 |
| Since 2007 (last 20 years) | 9 |
Descriptor
| Computer Security | 9 |
| Knowledge Level | 9 |
| Information Security | 7 |
| Risk | 5 |
| Computer Use | 4 |
| Foreign Countries | 4 |
| Internet | 4 |
| Computer Mediated… | 2 |
| Computer Science Education | 2 |
| Correlation | 2 |
| Educational Games | 2 |
| More ▼ | |
Source
| Online Submission | 3 |
| ProQuest LLC | 3 |
| Australian and International… | 1 |
| International Educational… | 1 |
| Journal of Cybersecurity… | 1 |
Author
| Aytaç, Tufan | 1 |
| Bryson Payne | 1 |
| C. Lindsay Linsky | 1 |
| Daniel Baker | 1 |
| Erdem, Mustafa | 1 |
| Gina Childers | 1 |
| Jack Byers | 1 |
| James J. Meadows III | 1 |
| Karademir, Tugra | 1 |
| Karaoglan Yilmaz, F. Gizem | 1 |
| Maina, Faith | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 5 |
| Reports - Research | 5 |
| Dissertations/Theses -… | 3 |
| Collected Works - Proceedings | 1 |
Education Level
| Secondary Education | 9 |
| Elementary Education | 4 |
| High Schools | 4 |
| Junior High Schools | 4 |
| Middle Schools | 4 |
| Higher Education | 3 |
| Postsecondary Education | 3 |
| Elementary Secondary Education | 1 |
| Grade 6 | 1 |
| Intermediate Grades | 1 |
Audience
Location
| Texas | 2 |
| Turkey | 2 |
| Finland | 1 |
| France | 1 |
| Turkey (Ankara) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Gina Childers; Weverton Ataide Pinheiro; Oluwatosin Daramola; C. Lindsay Linsky; Bryson Payne; Jack Byers; Daniel Baker – Journal of Cybersecurity Education, Research and Practice, 2025
Because K-12 teachers have access to private educational data, they are increasingly at risk of being affected by cybersecurity threats. Examining how teachers conceptualize cybersecurity is vital so that cybersecurity training can be tailored to teachers' understanding of cybersecurity. This study examined K-12 teachers' (n = 255) personalized…
Descriptors: Teacher Attitudes, Knowledge Level, Definitions, Computer Security
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
James J. Meadows III – ProQuest LLC, 2023
The purpose of this exploratory qualitative study was to explore the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. My study addressed whether security training for teenagers will solve the…
Descriptors: Middle School Students, Public Schools, Gamification, Educational Games
Maina, Faith; Smit, Julie; Serwadda, Abdul – Australian and International Journal of Rural Education, 2021
The research experience for teachers (RET) professional development was a six-week long summer-intensive National Science Foundation (NSF) funded project that took place at a large university in western Texas. It was designed to provide a research-rich learning environment in data science and cybersecurity for STEM teachers in the region, which is…
Descriptors: Faculty Development, Summer Programs, STEM Education, Rural Schools
Yilmaz, Ramazan; Karaoglan Yilmaz, F. Gizem; Özturk, H. Tugba; Karademir, Tugra – Online Submission, 2017
Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome…
Descriptors: Foreign Countries, Secondary School Students, Computer Use, Internet
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Tekerek, Mehmet; Tekerek, Adem – Online Submission, 2013
In this study, elementary and high school students' information and computer security awareness levels were investigated. Information and Computer Security Awareness Scale was developed by the researcher and it was applied to 2447 students in the schools in center of Kahramanmaras City, towns, small towns and villages of Kahramanmaras province.…
Descriptors: Foreign Countries, Elementary School Students, High School Students, Knowledge Level
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection

Peer reviewed
Direct link
