Publication Date
| In 2026 | 0 |
| Since 2025 | 18 |
| Since 2022 (last 5 years) | 112 |
| Since 2017 (last 10 years) | 175 |
| Since 2007 (last 20 years) | 201 |
Descriptor
| Computer Security | 201 |
| Information Security | 201 |
| Foreign Countries | 75 |
| Computer Science Education | 53 |
| Internet | 49 |
| Privacy | 47 |
| Information Technology | 45 |
| Undergraduate Students | 34 |
| Student Attitudes | 32 |
| Teaching Methods | 32 |
| Knowledge Level | 26 |
| More ▼ | |
Source
Author
| Payne, Brian K. | 3 |
| Brooks, D. Christopher | 2 |
| Celeda, Pavel | 2 |
| Cummings, Jeff | 2 |
| Daniel L. Segal | 2 |
| David Kocsis | 2 |
| Donald F. Norris | 2 |
| Frydenberg, Mark | 2 |
| Janicki, Thomas | 2 |
| Laura K. Mateczun | 2 |
| Lawrence, Cameron | 2 |
| More ▼ | |
Publication Type
| Reports - Research | 201 |
| Journal Articles | 181 |
| Tests/Questionnaires | 19 |
| Speeches/Meeting Papers | 7 |
| Information Analyses | 4 |
| Legal/Legislative/Regulatory… | 3 |
| Dissertations/Theses -… | 1 |
| Numerical/Quantitative Data | 1 |
Education Level
Audience
| Policymakers | 3 |
| Teachers | 3 |
| Administrators | 1 |
| Students | 1 |
Location
| Turkey | 10 |
| United Kingdom | 6 |
| Canada | 5 |
| India | 5 |
| Texas | 5 |
| Australia | 4 |
| Spain | 4 |
| California | 3 |
| China | 3 |
| Europe | 3 |
| Italy | 3 |
| More ▼ | |
Laws, Policies, & Programs
| Family Educational Rights and… | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Thulasi M. Santhi; K. Srinivasan – IEEE Transactions on Learning Technologies, 2024
Cloud adoption in industrial sectors, such as process, manufacturing, health care, and finance, is steadily rising, but as it grows, the risk of targeted cyberattacks has increased. Hence, effectively defending against such attacks necessitates skilled cybersecurity professionals. Traditional human-based cyber-physical education is resource…
Descriptors: Artificial Intelligence, Information Security, Computer Security, Prevention
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2023
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are "general purpose" units (i.e., municipalities, counties, towns and townships).…
Descriptors: Information Security, Computer Security, Local Government, Public Policy
R. Ravichandran; Sonam Singh; P. Sasikala – Journal of Cybersecurity Education, Research and Practice, 2025
This study investigates the awareness and practices of cyber security among school teachers, exploring their understanding of cyber threats, online behaviours, and response mechanisms to cyber incidents. A structured questionnaire was administered to gather data on demographic information, cyber security training, online practices, and experiences…
Descriptors: Computer Security, Information Security, Teacher Characteristics, Training
Carrie Klein; Sean Baser; Jessica Colorado – State Higher Education Executive Officers, 2024
Integrity, security, and sustained investment in data systems are critical for state agencies and stakeholders to effectively harness information to inform policy and decision-making in postsecondary education. Recognizing this crucial need, the State Higher Education Executive Officers Association (SHEEO) has led the charge with its State…
Descriptors: Postsecondary Education, Educational Finance, Governance, Data Collection
Bendler, Daniel; Felderer, Michael – ACM Transactions on Computing Education, 2023
Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the…
Descriptors: Models, Information Security, Computer Security, Competence
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Mohamed Al Hemairy; Manar Abu Talib; Ather Khalil; Ahsan Zulfiqar; Takua Mohamed – Education and Information Technologies, 2024
Academic credentials play an immensely significant role in the career of a person and in the progress of society. The system in place currently used for the issuance, storage & sharing of academic credentials is quite inefficient in its operations, due to being paper based in large. There is also widespread fraud committed every year in terms…
Descriptors: Foreign Countries, Computer Security, Information Security, Credentials
Essohanam Djeki; Jules Dégila; Muhtar Hanif Alhassan – Education and Information Technologies, 2024
COVID-19 has significantly impacted humankind's lifestyle since its emergence. Educational institutions quickly adopted online courses to deal with its spread. Regrettably, the adoption of e-learning solutions, particularly in Africa, has not given due priority to security. However, cyberattacks and cyber incidents are leaping forward. To propose…
Descriptors: Foreign Countries, COVID-19, Pandemics, Electronic Learning
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Catal, Cagatay; Ozcan, Alper; Donmez, Emrah; Kasif, Ahmet – Education and Information Technologies, 2023
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an…
Descriptors: Computer Security, Information Security, College Programs, Knowledge Level
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Christine Wusylko; Zhen Xu; Kara M. Dawson; Pavlo D. Antonenko; Do Hyong Koh; Minyoung Lee; Amber E. Benedict; Swarup Bhunia – Journal of Research on Technology in Education, 2024
This article describes the use of a comic book to anchor a cryptology and cybersecurity curriculum for upper elementary students. Perceptions about the comic book from 138 students across 11 afterschool programs were examined using survey, classroom observation, and interviews. Data analysis revealed that the comic book created a…
Descriptors: Technology, Computer Security, Information Security, Cartoons

Peer reviewed
Direct link
