Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 4 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Security | 5 |
| Information Technology | 5 |
| Outcomes of Education | 5 |
| Career Readiness | 3 |
| Computer Science Education | 3 |
| Access to Education | 2 |
| Access to Information | 2 |
| Barriers | 2 |
| College Readiness | 2 |
| Computer Assisted Testing | 2 |
| Educational Improvement | 2 |
| More ▼ | |
Source
| Arab World English Journal | 1 |
| International Association for… | 1 |
| International Education… | 1 |
| Journal of Cybersecurity… | 1 |
| US Department of Education | 1 |
Author
| Abu-Taieh, Evon M. | 1 |
| Alluhaidan, Ala | 1 |
| Filipo Sharevski | 1 |
| Holbah, Wael A. | 1 |
| Melissa Dark | 1 |
| Paul Wagner | 1 |
| Robert Honomichl | 1 |
| Sandra Leiterman | 1 |
| Sharma, Vipin K. | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
| Collected Works - Proceedings | 1 |
| Reports - Descriptive | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Elementary Secondary Education | 2 |
| Higher Education | 2 |
| Postsecondary Education | 2 |
| Secondary Education | 2 |
| High Schools | 1 |
Audience
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| Greece | 1 |
| Hawaii | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Paul Wagner; Melissa Dark; Robert Honomichl; Filipo Sharevski; Sandra Leiterman – Journal of Cybersecurity Education, Research and Practice, 2025
The increasing prevalence of cybersecurity threats and the shortage of qualified professionals necessitate innovative solutions for cybersecurity education at all levels. Despite the expansion of postsecondary cybersecurity programs, employer dissatisfaction with graduates and a lack of standardized introductory curricula highlights the need for…
Descriptors: Information Security, Computer Security, Computer Science Education, National Security
Alluhaidan, Ala; Abu-Taieh, Evon M. – International Education Studies, 2020
Abstract The rapid growth of technology and related fields has led to creation in academia to match the expansion demand for IT professionals. One of the current majors that attract attention in industry is cybersecurity. There is a great need for individuals who are skilled in cybersecurity to protect IT infrastructure. Coaching a…
Descriptors: Outcomes of Education, Computer Security, Information Technology, Computer Science Education
Sharma, Vipin K.; Holbah, Wael A. – Arab World English Journal, 2022
The study investigates teachers' perceptions of the use of online language assessment (OLA) using technology and examines the scope of using online applications to validate the mode of assessment. It looks for EFL teachers' opinions of OLA to comprehend the many worries associated with the issues and improve the online assessment tools. The…
Descriptors: Language Teachers, Teacher Attitudes, English (Second Language), Second Language Learning
US Department of Education, 2018
The Department of Education Strategic Plan for Fiscal Years 2018-2022 describes the policy and operational priorities for the agency. The Plan details the Department's strategic goals and objectives over the next four years. The Plan also provides an overview of our Fiscal Year 2018-2019 Agency Priority Goals.
Descriptors: Strategic Planning, Educational Objectives, Elementary Secondary Education, Educational Improvement
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
