NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 31 to 45 of 460 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Catal, Cagatay; Ozcan, Alper; Donmez, Emrah; Kasif, Ahmet – Education and Information Technologies, 2023
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an…
Descriptors: Computer Security, Information Security, College Programs, Knowledge Level
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2023
Safe, secure, resilient, and accessible education system infrastructure, both physical and digital, is an essential factor for success. Yet, the digital infrastructure in the nation's K-12 schools is increasingly under threat from malicious cyber actors. This fact sheet: (1) describes the most common types of cyber threats currently facing school…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Jamaine Mungo – ProQuest LLC, 2022
The purpose of this generic qualitative inquiry research study is to examine the features that need to be improved in self-paced cybersecurity awareness training to educate retail employees to identify phishing attacks. Malicious phishing attacks are a significant threat to retail corporations' business operations and confidential data. Employees'…
Descriptors: Computer Security, Information Security, Training, Employees
Patrick Ward – ProQuest LLC, 2024
This proposal is to develop a framework for designing a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges such as program accreditation, workforce development, and Department of Homeland Security/National Security Agency…
Descriptors: Community Colleges, College Programs, Computer Security, Internet
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Zhen Xu; Kara M. Dawson; Pavlo D. Antonenko; Do Hyong Koh; Minyoung Lee; Amber E. Benedict; Swarup Bhunia – Journal of Research on Technology in Education, 2024
This article describes the use of a comic book to anchor a cryptology and cybersecurity curriculum for upper elementary students. Perceptions about the comic book from 138 students across 11 afterschool programs were examined using survey, classroom observation, and interviews. Data analysis revealed that the comic book created a…
Descriptors: Technology, Computer Security, Information Security, Cartoons
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Na Liu; Siyu Long; Florence Martin – Journal of Cybersecurity Education, Research and Practice, 2025
As children increasingly engage with digital platforms, the need for effective cybersecurity education has become urgent. This systematic review synthesizes 81 studies published between 2017 and 2024 to examine global curricula research focus and topics, pedagogical approaches and assessment methods, and key challenges in elementary cybersecurity…
Descriptors: Literature Reviews, Elementary School Students, Elementary School Curriculum, Computer Security
II Patrick Michael Damon – ProQuest LLC, 2023
The purpose of this study was to examine the effects of gamified training in cybersecurity concepts on individuals not employed in information technology roles compared to traditional pieces of training. As the world becomes increasingly connected technologically, so too do the cyber vulnerabilities increase, and it is essential for all types of…
Descriptors: Information Technology, Information Security, Computer Security, Gamification
Joshua Hanna – ProQuest LLC, 2023
The rise in cyber-related attacks targeting school districts is outpacing cybersecurity readiness, as education institutions in the USA continue to fall victim to online threats (Levin, 2022). The education industry has been slow to react to an increasingly dangerous security landscape, leading many schools to become prime targets and victims of…
Descriptors: Superintendents, Administrator Attitudes, Administrator Role, Computer Security
Owusu, Samuel – ProQuest LLC, 2023
Cybersecurity job roles and responsibilities constantly evolve due to technological advancements, complex infrastructure, and increasing cybersecurity threats and regulations. As a result, organizations require a highly skilled and experienced cybersecurity workforce in both the public and private sectors. Many colleges and universities offer…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Michael Dean Barker – ProQuest LLC, 2023
The emergence of new credentials is changing the landscape of traditional post-secondary education. The tight labor market's rising demand to fill vacancies in high-demand career fields such as cybersecurity has led to so-called "alternative credentials" to rapidly upskill and reskill existing professionals to move into the industry.…
Descriptors: Postsecondary Education, Credentials, Employment Qualifications, Labor Needs
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Hao; Zhang, Yan; Zhang, Song; Lyu, Tu – Education and Information Technologies, 2023
This study examines the effect of a gamified information security education system (ISES) on developing users' information security awareness and protection behavioral intention. We developed a research model based on affordance theory and means-end chain theory. Using a scenario-based experimental survey approach, we obtained 220 valid samples…
Descriptors: Intention, Information Security, Computer Security, Correlation
Peer reviewed Peer reviewed
Direct linkDirect link
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  31