Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 31 |
| Since 2017 (last 10 years) | 47 |
| Since 2007 (last 20 years) | 66 |
Descriptor
Source
Author
| Andrej Jerman Blažic | 2 |
| Borka Jerman Blažic | 2 |
| Cook, Kristin | 2 |
| Ivy, Jessica | 2 |
| Wang, Jianjun | 2 |
| Acheampong, Zoe | 1 |
| Adorjan, Michael | 1 |
| Alev Üstündag | 1 |
| Ali, Mohd Norawi | 1 |
| Amo, Laura C. | 1 |
| Amosun, Peter Adewale | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 50 |
| Reports - Research | 50 |
| Reports - Descriptive | 7 |
| Dissertations/Theses -… | 5 |
| Tests/Questionnaires | 4 |
| Collected Works - Proceedings | 3 |
| Books | 1 |
| Reports - Evaluative | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
Audience
| Policymakers | 1 |
| Practitioners | 1 |
Location
| Turkey | 5 |
| Malaysia | 3 |
| South Africa | 3 |
| Alabama | 2 |
| Australia | 2 |
| California | 2 |
| Canada | 2 |
| Georgia | 2 |
| Texas | 2 |
| Utah | 2 |
| Arizona | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
| Program for International… | 1 |
What Works Clearinghouse Rating
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Gina Childers; Weverton Ataide Pinheiro; Oluwatosin Daramola; C. Lindsay Linsky; Bryson Payne; Jack Byers; Daniel Baker – Journal of Cybersecurity Education, Research and Practice, 2025
Because K-12 teachers have access to private educational data, they are increasingly at risk of being affected by cybersecurity threats. Examining how teachers conceptualize cybersecurity is vital so that cybersecurity training can be tailored to teachers' understanding of cybersecurity. This study examined K-12 teachers' (n = 255) personalized…
Descriptors: Teacher Attitudes, Knowledge Level, Definitions, Computer Security
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Connie D. Howard – ProQuest LLC, 2021
This qualitative study contributes to the limited body of knowledge on cybersecurity in middle schools beyond awareness programs. The purpose was to develop a pilot training module for middle school students comprising an analysis of public documents to examine what topics should be included in a pilot training program to reduce problematic cyber…
Descriptors: Program Development, Pilot Projects, Middle School Students, Computer Security
Subasi, Sibel; Korkmaz, Özgen; Çakir, Recep – International Journal of Technology in Education and Science, 2023
The aim of this study is to examine the digital footprint awareness of students while surfing on cyberbullying, cyber security and social networks with demographic data such as class, school, gender, internet usage level. This research was carried out using a descriptive survey model. The study group of the research consisted of 467 volunteer…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Secondary School Students
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Maureen Namukasa; Bhoomin B. Chauhan; Carlie Swords; Curtice Gough; Weronika Dymanus; Catherine Diresta; John Vitali; Vivek Sharma; T. J. OConnor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2025
This study aimed to evaluate the effectiveness of an eight-module Cybersecurity course at increasing the learning outcomes of middle and high school students with little to no experience in Computer Science and Cybersecurity, including underrepresented minorities (URMs) in Cybersecurity. Twice we administered and evaluated the Cybersecurity…
Descriptors: Computer Security, Internet, Instructional Effectiveness, Middle School Students
Cheryl Beauchamp; Holly M. Matusovich – Journal of Cybersecurity Education, Research and Practice, 2023
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable…
Descriptors: Information Technology, Computer Security, Information Security, Drills (Practice)
Israel Mbekezeli Dabengwa; Sibonile Moyo; Smart Ncube; Tinashe Byron Gashirai; Daga Makaza; Paul Makoni; Notice Pasipamire; Goodwill Kudakwashe Chademana; Mufudzi Mafoti; Stonard Mapfumo; Dzikamayi Mandaza – Cogent Education, 2024
This paper presents a study that investigates digital competencies within the Zimbabwean secondary education system. Limited research has focused on Zimbabwe's secondary schoolteachers' digital literacy in online learning. The study utilised DigComp 2.2 as the framework, and employed a multi-method participative approach to collect data from…
Descriptors: Foreign Countries, Technological Literacy, Secondary School Teachers, Online Courses
Desmet, Ophélie A.; Crimmins, Danielle M.; Flewellen, Gerniya; Seigfried-Spellar, Kathryn C. – Gifted Child Today, 2023
The purpose of the present study was to evaluate a cybersecurity and digital forensics enrichment program for gifted and talented students to determine students' perceptions of this enrichment course. We evaluated data from 25 secondary education students and one educator to examine their perceptions of the program. Responses from students and the…
Descriptors: Academically Gifted, Secondary School Students, Student Attitudes, Program Evaluation
Burrows, Andrea C.; Borowczak, Mike; Mugayitoglu, Bekir – Education Sciences, 2022
Computer science, cybersecurity education, and microcredentials are becoming more pervasive in all levels of the educational system. The purpose of this study was partnering with precollegiate teachers: (1) to investigate the self-efficacy of 30 precollegiate teacher participants towards computer science before, during, and after three iterations…
Descriptors: Computer Science Education, Computer Security, Coding, Partnerships in Education
Borka Jerman Blažic; Andrej Jerman Blažic – International Society for Technology, Education, and Science, 2024
Based on an exhaustive study from 2001-2003 involving 14 high schools in the EU, a definition of the educational content and the aligned methodology for high school levels was developed for two areas--cyber safety and cybersecurity--with the aim of improving the knowledge and skills of students and their teachers. Available sources, including…
Descriptors: Teaching Methods, Computer Science Education, Information Security, Computer Security
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet

Peer reviewed
Direct link
