Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Networks | 3 |
| Computer Security | 3 |
| Technological Literacy | 3 |
| College Students | 2 |
| Computer Science Education | 2 |
| Age Differences | 1 |
| Career Readiness | 1 |
| Computation | 1 |
| Confidentiality | 1 |
| Cooperation | 1 |
| Educational Needs | 1 |
| More ▼ | |
Author
| Brustoloni, Jose Carlos | 1 |
| Jim Belair | 1 |
| Khanittha Sittitiamjan | 1 |
| Nicole Waskie-Laura | 1 |
| Pongpisit Wuttidittachotti | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments

Peer reviewed
Direct link
