NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Equal Access1
What Works Clearinghouse Rating
Showing 46 to 60 of 217 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ruta Pirta-Dreimane; Agne Brilingaite; Evita Roponena; Karen Parish; Janis Grabis; Ricardo Gregorio Lugo; Martinš Bonders – Technology, Knowledge and Learning, 2025
Incorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk…
Descriptors: Computer Security, Computer Science Education, Educational Games, Gamification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Humayun Zafar; Carole L. Hollingsworth; Tridib Bandyopadhyay; Adriane B. Randolph – Journal of Cybersecurity Education, Research and Practice, 2024
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus on efforts in the Southeast region of the United States. The discussion features insights from a panel consisting of an academic cybersecurity…
Descriptors: Computer Security, Career Pathways, Computer Science Education, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Workman, Michael D.; Luevanos, J. Anthony; Mai, Bin – IEEE Transactions on Education, 2022
Contribution: Based on a previous exploratory study, this research further investigated learning mode contributions from simulations and live competitive activities compared to a traditional classroom, laboratory, and testing approach to instruction in order to assess the applied behavioral contributions of each. Background: Cybersecurity…
Descriptors: Computer Security, Information Security, Computer Science Education, Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Karjalainen, Mika; Ojala, Anna-Liisa; Vatanen, Marko; Lötjönen, Jarno – International Journal of Adult Education and Technology, 2022
This qualitative study includes nine semi-structured interviews with cybersecurity experts from different security-related organizations who are familiar with cybersecurity exercises. Its contribution to cybersecurity workforce development focuses on organizational learning rather than individual skills development and relevant competencies. It…
Descriptors: Computer Security, Computer Science Education, Organizational Learning, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Musa Adekunle Ayanwale; Ismaila Temitayo Sanusi; Rethabile Rosemary Molefi; Adekunle Olusola Otunla – Education and Information Technologies, 2024
The increasing technology reliance in today's world has amplified the need for cybersecurity education for all. Hence, initiatives regarding the integration of cybersecurity education within the pre-college level have begun to emerge in recent times. However, limited research exists regarding in-service or pre-service teachers' perspectives on…
Descriptors: Computer Security, Computer Science Education, Preservice Teacher Education, Preservice Teachers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Amy Esther Kuiken – ProQuest LLC, 2024
The cybersecurity landscape in the United States has rapidly evolved, marked by risk and novel threats (Georgescu, 2021; Siraj et al., 2021). Today, security mindsets are "widely accepted in the computer security community as … essential … for successful cybersecurity practice" (Peterson, 2021, para. 1), valuable to aspiring…
Descriptors: Second Language Learning, Second Language Instruction, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Barrett, Diane – Information Systems Education Journal, 2020
In a cloud computing environment, traditional digital forensic processes (such as turning off the computer to image the computer hard drive) can be disruptive to businesses because the data of businesses may be co-mingled with other content. As technology changes, the way digital forensics acquisitions are conducted are also changing. The change…
Descriptors: Computer Science Education, Crime, Evidence, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Maja Videnovik; Tone Vold; Linda Kiønig; Vladimir Trajkovik – International Journal of Game-Based Learning, 2025
This study examines whether game-based learning can be used as a promising strategy for fostering students' engagement and motivation. Researchers investigate students' perceptions of the effectiveness of three educational games designed to teach cybersecurity in primary schools: an escape room-style game, a treasure hunt game, and a quiz…
Descriptors: Foreign Countries, Game Based Learning, Learner Engagement, Student Empowerment
Lee, Heesuk – ProQuest LLC, 2022
Many organizations are providing employee training to raise security awareness as data breaches increase. Organizational digital transformation has accelerated, especially during the COVID-19 outbreak. It has made the technology industry a prime target for cyberattacks. Although more organizations invest in cybersecurity training, data breaches…
Descriptors: Information Technology, Information Security, Employee Attitudes, Knowledge Level
Shapna Sultana Pal – ProQuest LLC, 2022
Educators of graduate cybersecurity education lack decision methodologies to aid in selecting and prioritizing cybersecurity criteria and tools to provide hands-on learning in cyber courses. Educators are challenged with keeping the cybersecurity tools in the education curriculum relevant and updated. The risk of not doing so, is possibly…
Descriptors: Computer Security, Information Security, Computer Science Education, Decision Making
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  15