Publication Date
| In 2026 | 0 |
| Since 2025 | 22 |
| Since 2022 (last 5 years) | 209 |
| Since 2017 (last 10 years) | 353 |
| Since 2007 (last 20 years) | 457 |
Descriptor
| Computer Security | 460 |
| Information Security | 460 |
| Information Technology | 109 |
| Foreign Countries | 99 |
| Privacy | 93 |
| Computer Science Education | 90 |
| Internet | 90 |
| Computer Software | 68 |
| Teaching Methods | 66 |
| Higher Education | 60 |
| Educational Technology | 51 |
| More ▼ | |
Source
Author
| Lawrence, Cameron | 4 |
| Marquardson, Jim | 4 |
| Payne, Brian K. | 3 |
| Anderson, Jimmeka | 2 |
| Antonenko, Pavlo | 2 |
| Belshaw, Scott H. | 2 |
| Brooks, D. Christopher | 2 |
| Celeda, Pavel | 2 |
| Cigularova, Daniela | 2 |
| Clouse, Shawn | 2 |
| Cummings, Jeff | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Texas | 12 |
| Turkey | 10 |
| India | 9 |
| United Kingdom | 9 |
| Canada | 7 |
| United States | 7 |
| China | 6 |
| Florida | 6 |
| Maryland | 6 |
| North Carolina | 6 |
| Australia | 5 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Barthur, Ashrith – ProQuest LLC, 2016
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding…
Descriptors: Computer Security, Information Security, Data Collection, Internet
Payne, Brian K.; Vandecar-Burdin, Tancy; Cigularova, Daniela – NACADA Journal, 2022
In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the…
Descriptors: Information Security, Information Technology, Community Colleges, College Faculty
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Pitman, Lora; Payne, Brian K.; Vandecar-Burdin, Tancy; Thorbjornsen, Lenora – Journal of Cybersecurity Education, Research and Practice, 2022
As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across…
Descriptors: College Students, STEM Education, Computer Security, Information Security
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising
Tosun, Nilgün – Journal of Education and Training Studies, 2018
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Social Media
Pérez-Escoda, Ana; Lena-Acebo, Francisco Javier; García-Ruiz, Rosa – Digital Education Review, 2021
Networked society before pandemic situation had become the context of a technology-supported environment for learning and teaching. Since COVID-19 pandemic occurred learning happened essentially mediated through connected smart devices that demand digital skills and reinforced Smart learning. This study aims to present a descriptive and…
Descriptors: Foreign Countries, COVID-19, Pandemics, Educational Technology
Tsado, Lucy – Journal of Cybersecurity Education, Research and Practice, 2019
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not…
Descriptors: Information Security, National Security, Computer Security, Computer Science Education
Hairston, Jesse R.; Smith, Derrick W.; Williams, Tania; Sabados, William T.; Forney, Steven – Journal of Science Education for Students with Disabilities, 2020
This work showcases specific adaptations used to make cybersecurity accessible to high school students with visual impairments and blindness (VIB). The rapidly growing field of cybersecurity demands a diverse workforce; however, barriers exist which can deter students with disabilities from studying cybersecurity, let alone pursuing a career in…
Descriptors: Visual Impairments, Blindness, High School Students, Computer Security
Bates, Justin D. – ProQuest LLC, 2017
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
Descriptors: Information Technology, Information Security, Professional Personnel, Certification
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Ramlo, Susan E.; Nicholas, John B. – Journal of Cybersecurity Education, Research and Practice, 2020
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study…
Descriptors: Student Attitudes, Information Security, Best Practices, Computer Security
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2020
The onset of COVID-19 has dramatically increased the usage of digital learning formats by education agencies across the nation and shifted the learning environment to "school at home." Since students are online more, they are vulnerable to more threats. Cyber safety is critical and is a shared responsibility of students, parents, and…
Descriptors: COVID-19, Pandemics, Educational Technology, Technology Uses in Education
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security

Direct link
Peer reviewed
