Publication Date
| In 2026 | 0 |
| Since 2025 | 6 |
| Since 2022 (last 5 years) | 38 |
| Since 2017 (last 10 years) | 66 |
| Since 2007 (last 20 years) | 106 |
Descriptor
| Computer Security | 120 |
| Internet | 120 |
| Foreign Countries | 62 |
| Information Security | 49 |
| Computer Mediated… | 26 |
| Privacy | 26 |
| Information Technology | 23 |
| Safety | 19 |
| Computer Science Education | 18 |
| Bullying | 17 |
| Knowledge Level | 17 |
| More ▼ | |
Source
Author
| Cummings, Jeff | 2 |
| Frydenberg, Mark | 2 |
| Hope, Andrew | 2 |
| Janicki, Thomas | 2 |
| Martin, Florence | 2 |
| Yates, David J. | 2 |
| Zhao, Jensen J. | 2 |
| Abasi-amefon O. Affia | 1 |
| Abd Rahman, Nur Hidayah | 1 |
| Abhishek Vaish | 1 |
| Adesina, Omolayo A. | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 120 |
| Journal Articles | 113 |
| Tests/Questionnaires | 8 |
| Information Analyses | 2 |
| Guides - Non-Classroom | 1 |
| Numerical/Quantitative Data | 1 |
| Opinion Papers | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
Location
| Turkey | 11 |
| Australia | 6 |
| Spain | 6 |
| India | 4 |
| Malaysia | 4 |
| Texas | 4 |
| United Kingdom | 4 |
| Canada | 3 |
| China | 3 |
| Israel | 3 |
| Italy | 3 |
| More ▼ | |
Laws, Policies, & Programs
| Equal Access | 2 |
| G I Bill | 1 |
| United Nations Convention on… | 1 |
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Kaur, Kanwalinderjit – Journal of Cybersecurity Education, Research and Practice, 2023
Embedding a pairwise key distribution approach in IoT systems is challenging as IoT devices have limited resources, such as memory, processing power, and battery life. This paper presents a secure and lightweight approach that is applied to IoT devices that are divided into Voronoi clusters. This proposed algorithm comprises XOR and concatenation…
Descriptors: Internet, Computer Security, Algorithms, Equipment
Francisco D. Guillén-Gámez; Inmaculada Martínez-García; Enrique Alastor; Lukasz Tomczyk – Computers in the Schools, 2024
The authors have developed a psychometric instrument with the purpose of assessing the digital competencies of teachers in aspects of cybersecurity. From the collection of data, different secondary objectives were carried out: (1) identify if there were significant differences regarding gender; (2) understand if there are significant differences…
Descriptors: Preservice Teachers, Technological Literacy, Internet, Safety
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Zorlu, Eyup – Journal of Learning and Teaching in Digital Age, 2023
The purpose of this study is to examine the relationship between college students' cyberbullying awareness and their ability to ensure their personal cybersecurity. A total of 401 students participated in this study. The Ability to Ensure Personal Cybersecurity Scale, the Cyberbullying Awareness Scale, and a Personal Information Form developed by…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Knowledge Level
Norma Torres-Hernández; María-Jesús Gallego-Arrufat; María del Mar García-Ruiz – Digital Education Review, 2023
Online risks are a concern for citizens in the digital society. Many sectors of the population lack training to face, prevent and solve problematic situations arising from Internet use. University researchers and innovation agents in small towns in southern Spain are carrying out an educational programme of 13 intergenerational workshops to…
Descriptors: Intergenerational Programs, Digital Literacy, Internet, Open Education
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Subasi, Sibel; Korkmaz, Özgen; Çakir, Recep – International Journal of Technology in Education and Science, 2023
The aim of this study is to examine the digital footprint awareness of students while surfing on cyberbullying, cyber security and social networks with demographic data such as class, school, gender, internet usage level. This research was carried out using a descriptive survey model. The study group of the research consisted of 467 volunteer…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Secondary School Students
Georgia Zempila; Stelios Xinogalos – Discover Education, 2025
The Internet is nowadays an integral part of adolescents' everyday life, bringing several benefits but risks as well. Although adolescents are familiar with technology, there seems to be a gap in their knowledge in safety and data protection on the Internet. So it is clear that adolescents have to be educated on relevant issues and serious games…
Descriptors: Educational Games, Teaching Methods, Internet, Information Security
Feray Küçükbas Duman – European Journal of Education (EJED), 2022
The most practical and fastest way to access information in today's world is via the internet. Thanks to the internet, the necessary information can be reached in a short time. Nevertheless, in addition to the benefits of the internet, it can also pose risks for users. For this reason, it is important to increase the level of awareness of…
Descriptors: Undergraduate Students, Physical Education, Student Behavior, Internet
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Maureen Namukasa; Bhoomin B. Chauhan; Carlie Swords; Curtice Gough; Weronika Dymanus; Catherine Diresta; John Vitali; Vivek Sharma; T. J. OConnor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2025
This study aimed to evaluate the effectiveness of an eight-module Cybersecurity course at increasing the learning outcomes of middle and high school students with little to no experience in Computer Science and Cybersecurity, including underrepresented minorities (URMs) in Cybersecurity. Twice we administered and evaluated the Cybersecurity…
Descriptors: Computer Security, Internet, Instructional Effectiveness, Middle School Students
Sisi Long; Ting Zhu; Xizi Chen – Digital Education Review, 2023
Problematic Internet use (PIU) can lead to dysfunction and undesired consequences, especially in adolescents and youths. Studies have shown that personal emotional characteristics and relationships with others are associated with PIU. We pursue the neglected question of whether there is a correlation between personal ability, such as new media…
Descriptors: Internet, Media Literacy, College Students, Gender Differences
Esra Merve Çaliskan; I?rem I?tegin – Journal of Cybersecurity Education, Research and Practice, 2024
With the development of technology, security, a core human concern throughout history, has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of…
Descriptors: Gender Differences, Computer Security, Information Security, Sex Role
Panskyi, Taras; Korzeniewska, Ewa – Education and Information Technologies, 2023
The authors decided to investigate the impact of the pandemic period and the resulting limitations in Polish primary school online security education. The first part of the study investigates the impact of the COVID-19 pandemic on students' educational learning outcomes in information and Internet security. The study has been performed via a…
Descriptors: Elementary School Students, Foreign Countries, Computer Security, Pandemics
Arikli, Güven – Turkish Online Journal of Educational Technology - TOJET, 2023
Real-life threats are at the root of all possible threats to be encountered on the Internet. All risk headings for the Internet are situations that can be encountered in real life. Therefore, we should pay attention to the risks of the virtual world by learning to use the internet consciously, safely and effectively, and by teaching our children…
Descriptors: Internet, Computer Use, Child Safety, Family Role

Peer reviewed
Direct link
