Publication Date
| In 2026 | 0 |
| Since 2025 | 22 |
| Since 2022 (last 5 years) | 209 |
| Since 2017 (last 10 years) | 353 |
| Since 2007 (last 20 years) | 457 |
Descriptor
| Computer Security | 460 |
| Information Security | 460 |
| Information Technology | 109 |
| Foreign Countries | 99 |
| Privacy | 93 |
| Computer Science Education | 90 |
| Internet | 90 |
| Computer Software | 68 |
| Teaching Methods | 66 |
| Higher Education | 60 |
| Educational Technology | 51 |
| More ▼ | |
Source
Author
| Lawrence, Cameron | 4 |
| Marquardson, Jim | 4 |
| Payne, Brian K. | 3 |
| Anderson, Jimmeka | 2 |
| Antonenko, Pavlo | 2 |
| Belshaw, Scott H. | 2 |
| Brooks, D. Christopher | 2 |
| Celeda, Pavel | 2 |
| Cigularova, Daniela | 2 |
| Clouse, Shawn | 2 |
| Cummings, Jeff | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Texas | 12 |
| Turkey | 10 |
| India | 9 |
| United Kingdom | 9 |
| Canada | 7 |
| United States | 7 |
| China | 6 |
| Florida | 6 |
| Maryland | 6 |
| North Carolina | 6 |
| Australia | 5 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Feray Küçükbas Duman – European Journal of Education (EJED), 2022
The most practical and fastest way to access information in today's world is via the internet. Thanks to the internet, the necessary information can be reached in a short time. Nevertheless, in addition to the benefits of the internet, it can also pose risks for users. For this reason, it is important to increase the level of awareness of…
Descriptors: Undergraduate Students, Physical Education, Student Behavior, Internet
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
M. Claire Buchan; Jasmin Bhawra; Tarun Reddy Katapally – Smart Learning Environments, 2024
The rapid expansion of digital connectivity has provided youth with wide-ranging access to digital platforms for communication, entertainment, and education. In light of this profound shift, there have been growing concerns about online safety, data privacy, and cybersecurity. A critical factor influencing the ability of youth to responsibly…
Descriptors: Digital Literacy, Program Implementation, Measures (Individuals), Foreign Countries
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security
Garrett J. Stevens – ProQuest LLC, 2023
Faculty and staff working from home during the COVID pandemic were presented with new challenges in adapting to emergency remote teaching, as well as new and expanded cyber security threats. Changes to course delivery, remote access from public locations, and the potential of faculty and staff storing confidential educational records on…
Descriptors: COVID-19, Pandemics, College Faculty, School Personnel
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Jonathan Hobbs – ProQuest LLC, 2023
Cybersecurity protection remains at the forefront of many organizations' information and communication technology strategies and investments. Higher education has become a profitable target for cyber-attacks which has many institutions reevaluating their cybersecurity awareness programs. The purpose of this research was to determine the…
Descriptors: Computer Security, Information Security, Higher Education, College Faculty
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Frontera, Paul J.; Rodriguez-Seda, Erick J. – IEEE Transactions on Education, 2021
Contribution: This article presents a project-based learning (PBL) activity for use in the instruction of network attacks on cyber-physical systems. Student learning is analyzed to determine the project's contribution to learning outcome attainment. Background: The literature contains a significant amount of research on the benefits of PBL as a…
Descriptors: Student Projects, Teaching Methods, Computer Security, Information Security
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
State Educational Technology Directors Association, 2022
Many districts struggle to access the cybersecurity expertise or other resources needed to secure their networks and data appropriately. This isn't because mitigation strategies don't exist. Often, the barrage of suggestions and warnings directed at school IT leaders are too overwhelming to navigate, are not properly scoped for educational…
Descriptors: Computer Security, Information Security, Privacy, Elementary Secondary Education

Peer reviewed
Direct link
