Publication Date
| In 2026 | 0 |
| Since 2025 | 56 |
| Since 2022 (last 5 years) | 373 |
| Since 2017 (last 10 years) | 645 |
| Since 2007 (last 20 years) | 1197 |
Descriptor
| Computer Security | 1624 |
| Internet | 473 |
| Information Security | 459 |
| Information Technology | 435 |
| Foreign Countries | 284 |
| Privacy | 276 |
| Computer Software | 267 |
| Computer Networks | 249 |
| Higher Education | 248 |
| Educational Technology | 221 |
| Computer Science Education | 215 |
| More ▼ | |
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Kaur, Kanwalinderjit – Journal of Cybersecurity Education, Research and Practice, 2023
Embedding a pairwise key distribution approach in IoT systems is challenging as IoT devices have limited resources, such as memory, processing power, and battery life. This paper presents a secure and lightweight approach that is applied to IoT devices that are divided into Voronoi clusters. This proposed algorithm comprises XOR and concatenation…
Descriptors: Internet, Computer Security, Algorithms, Equipment
Kevin Dennis – ProQuest LLC, 2024
The first step to improving an organization's security posture is to define the organization's security goals. At a technical level, these goals are expressed as security policies. Security policies are predicates over programs, that return true or false if the program adheres to the policy. Defining these policies correctly is thus essential to…
Descriptors: Information Security, Computer Security, Policy, Integrity
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Mahao Mahao; Julia Chere-Masopha – Discourse and Communication for Sustainable Education, 2025
Digital literacy has become crucial for functionality and productivity in academics, work, and everyday community lives. However, easy access to digital technologies, accompanied by limited digital literacy, can expose users to the dangers that lurk in the digital world. Young people, who are frequent users of these technologies yet have less…
Descriptors: Student Teachers, Student Attitudes, Computer Security, Foreign Countries
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Oumaima Ouadoud; Tarik Chafiq; Ahmed Eddaoui – Educational Process: International Journal, 2025
Background/purpose. This research was conducted to address the growing need for more secure, transparent, and efficient solutions for the issuance and management of university degrees. The main purpose of the study is to evaluate which Blockchains are best suited for this application, aiming to enhance the reliability and speed of degree-related…
Descriptors: Academic Degrees, Technology Uses in Education, Computer Security, Academic Records
Marian Horváth; Marek Hlásny; Slávka Krásna – Acta Educationis Generalis, 2025
Introduction: The digital era is reshaping not only technology and economy but also the legal systems governing democratic societies. The rapid emergence of artificial intelligence, big data, and digitisation calls for proactive adaptation of legal frameworks. This article explores the intersection of digital transformation and the rule of law,…
Descriptors: Democracy, Laws, Artificial Intelligence, Governance
Peer reviewedIshrat Ahmed; Paul Alvarado; Siddharth Jain; Tracy Arner; Elizabeth Reilley; Danielle S. McNamara – Grantee Submission, 2025
The rapid evolution of artificial intelligence (AI) has created an unprecedented opportunity for innovation across industries, but its complexity often presents a steep learning curve for many (Roberts & Candi, 2024; Gunner, 2025). This highlights the need for user-friendly tools that bridge the gap between AI's potential and its practical…
Descriptors: State Universities, Artificial Intelligence, Usability, Innovation
David R. E. Halla – ProQuest LLC, 2024
The study investigated the use of formalized cybersecurity apprenticeships as a means of workforce development to meet the needs of employers seeking to fill cybersecurity positions. The study employed a quantitative analysis using a constructivist grounded theory approach utilizing a survey with questions based on the findings of apprenticeships…
Descriptors: Computer Security, Labor Force Development, Apprenticeships, Models
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Human Aspects of Cyber Security for Computing Higher Education: Current Status and Future Directions
Kaie Maennel; Olaf Maennel – ACM Transactions on Computing Education, 2025
The human aspects of cyber security are fundamental as these are interlinked with processes and technology in building resilience against an evolving and complex threat landscape. It is vital to teach future cyber security specialists sufficient knowledge about human aspects in order to strengthen the defences and defend against malicious actors.…
Descriptors: Computer Security, Computer Science Education, College Curriculum, Teaching Methods
Kuru, Hüseyin – Journal of Learning and Teaching in Digital Age, 2023
After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has…
Descriptors: Terrorism, Information Technology, Facilities, Nuclear Energy
Cheryl Resch – ProQuest LLC, 2024
Software vulnerabilities in commercial products are an issue of national importance. The most prevalent breaches are input validation vulnerabilities, and these are easily avoidable. This dissertation contributes to cybersecurity education with a set of hands-on interventions tailored for three CS courses, a set of reflection prompts to encourage…
Descriptors: College Students, Computer Science Education, Computer Security, Curriculum Development

Direct link
