NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 46 to 60 of 135 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thomas, Kevin M.; Ivy, Jessica; Cook, Kristin; Kelley, Robert R. – Journal of Cybersecurity Education, Research and Practice, 2022
The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers' technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Juliana E. Raffaghelli; Bonnie Stewart – OTESSA Conference Proceedings, 2021
In the higher education context, an increasing concern on the technical or instrumental approach permeates attention to academics' data literacies and faculty development. The need for data literacy to deal specifically with the rise of learning analytics in higher education has been raised by some authors, though in spite of some focus on the…
Descriptors: Statistics Education, Faculty Development, Higher Education, Learning Analytics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ravendran, Saravnesvaran; Karpudewan, Mageswary; Ali, Mohd Norawi; Lay, Yoon Fah – Malaysian Online Journal of Educational Sciences, 2023
The Fourth Industrial Revolution (4IR) refers to the current rapid technological growth that fundamentally changes how humans live. 4IR is essential to improve higher education worldwide and develop crucial skills such as e-learning and innovation, information and media technology, and life and career skills. This study aims to assess the…
Descriptors: Technological Advancement, Foreign Countries, Technological Literacy, Pedagogical Content Knowledge
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mongkonrat Chaiyadet; Pallop Piriyasurawong; Panita Wannapiroon – International Education Studies, 2024
The objective of this research is to develop and study the outcomes of developing the Ubiquitous Buddhism Learning Ecosystem for Proactive Buddhism Propagation for Digital Citizenship. The sample group used in the research consists of nine individuals selected through targeted sampling, comprising experts in the design and development of learning…
Descriptors: Buddhism, Models, Citizenship, Educational Philosophy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Payne, Bryson R. – Journal of Cybersecurity Education, Research and Practice, 2019
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semiautonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number…
Descriptors: Computer Security, Motor Vehicles, Information Security, Artificial Intelligence
Office of Educational Technology, US Department of Education, 2023
Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This "School Leader Digital Learning Guide" is a resource to help school leaders consider, plan, fund, implement, maintain, and adapt…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fidalgo, Patricia; Thormann, Joan – International Association for Development of the Information Society, 2017
This study of teachers in training in UAE addresses Information Literacy skills including ease of learning, usefulness and instructional preferences. Most teachers in training found that IL skills are both useful and ease to learn. Multiple instructional strategies were preferred by the teachers in training. The study also shows that although most…
Descriptors: Information Literacy, Privacy, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hairston, Jesse R.; Smith, Derrick W.; Williams, Tania; Sabados, William T.; Forney, Steven – Journal of Science Education for Students with Disabilities, 2020
This work showcases specific adaptations used to make cybersecurity accessible to high school students with visual impairments and blindness (VIB). The rapidly growing field of cybersecurity demands a diverse workforce; however, barriers exist which can deter students with disabilities from studying cybersecurity, let alone pursuing a career in…
Descriptors: Visual Impairments, Blindness, High School Students, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Mark; Baskett, Mike; Allen, Mark; Francis, Hulya; Kifayat, Kashif – Innovations in Education and Teaching International, 2018
Animated learning materials have the potential to support the teaching and learning process. In this paper, we examine the comparative usefulness of animated and static learning materials for teaching cyber security concepts to a group of UK undergraduate computer science students. The animated cyber security learning materials appeared to be…
Descriptors: Foreign Countries, Information Security, Teaching Methods, Animation
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9