Publication Date
| In 2026 | 0 |
| Since 2025 | 56 |
| Since 2022 (last 5 years) | 373 |
| Since 2017 (last 10 years) | 645 |
| Since 2007 (last 20 years) | 1197 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Tang Wee Teo; Sherwin John San Buenaventura Mabulo; Kim Chwee Daniel Tan; Jin Xin Matilda Ho; Xue Xian Thea Tan – Journal of Science Education and Technology, 2025
STEM (science, technology, engineering, mathematics) hackathons have been conducted to offer opportunities for diverse participants to work collaboratively and intensely on tasks within a short period. However, most literature about hackathons does not offer theoretical discussions on the affordances of such learning contexts for school students.…
Descriptors: Epistemology, STEM Education, Computer Security, Programming
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Christine Wusylko; Kara Dawson; Zhen Xu; Pavlo Antonenko; DoHyong Koh – Journal of Science Education and Technology, 2025
Online professional development (OPD) is a popular professional learning option, especially for those with monetary and time constraints such as afterschool educators. This study reports on the design, implementation, and evaluation of an OPD on preparing 18 afterschool educators to teach a content-heavy, transmedia, STEM curriculum on cryptology…
Descriptors: Online Courses, Faculty Development, After School Programs, STEM Education
Damjan Fujs; Simon Vrhovec; Tomaž Hovelja; Damjan Vavpotic – Education and Information Technologies, 2025
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the…
Descriptors: Foreign Countries, Older Adults, Digital Literacy, Computer Literacy
Mengjiao Zhang – ProQuest LLC, 2024
The rise of Artificial Intelligence technology has raised concerns about the potential compromise of privacy due to the handling of personal data. Private AI prevents cybercrimes and falsehoods and protects human freedom and trust. While Federated Learning offers a solution by model training across decentralized devices or servers, thereby…
Descriptors: Privacy, Cooperative Learning, Natural Language Processing, Learning Processes
Richard E. Taylor – ProQuest LLC, 2024
The problem addressed in this research study is that multinational organizations that often disregard adopting cybersecurity threat awareness training in the workplace to protect their cyberinfrastructure assets cannot efficiently detect and respond to malicious advance persistent threat (APT) cyberattacks. There is a disconnect between security…
Descriptors: Computer Security, Consciousness Raising, International Organizations, Training
Dhanya Pramod – Journal of Applied Research in Higher Education, 2025
Purpose: The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and…
Descriptors: Gamification, Computer Security, Information Security, Training
Ajibola Omoniyi Victor; Hamimah Ujir – Journal of Education and Learning (EduLearn), 2025
Information and communication technology (ICT) has become an essential part of the daily lives of tertiary students. However, research into assessing digital competency and its effects on academic performance is still limited. This paper explores students' needs for digital competence, the impact of digital access on academic performance, and the…
Descriptors: Foreign Countries, Undergraduate Students, Digital Literacy, Student Attitudes
Oralbek Yskak; Natalya Seitakhmetova; Sholpan Zhandossova; Marhabbat Nurov – Journal of Social Studies Education Research, 2025
Digital transformation is reshaping social and economic relations through the adoption of digital technologies, playing a crucial role in Kazakhstan's modernization and economic diversification. This study aims to comprehensively analyze the multifaceted process of digital transformation in Kazakhstan, with a particular emphasis on identifying…
Descriptors: Foreign Countries, Mathematical Models, Information Technology, Professional Personnel
Brian Khoa Ngac – ProQuest LLC, 2024
Curriculum development is currently being done in a variety of ways: individually, with peers, through an academic committee that may or may not have an industry representative, or through workshops. But the current ways of developing curriculum have challenges and inefficiencies, specifically when using groups and committee (logistical…
Descriptors: Expertise, Cooperation, Curriculum Development, Computer Security
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Hrishikesh Bhide – ProQuest LLC, 2024
The meteoric rise in software and technology has altered the paradigm of information security and privacy. Classified information, stored earlier behind locked doors, is now stored on the internet on servers that can be accessed from anywhere on the globe. As a result of these advancements, we are now vulnerable to cyber-attacks. Cyber-attacks are…
Descriptors: Game Based Learning, Learning Strategies, Computer Security, Computer Science Education
Thulasi M. Santhi; K. Srinivasan – IEEE Transactions on Learning Technologies, 2024
Cloud adoption in industrial sectors, such as process, manufacturing, health care, and finance, is steadily rising, but as it grows, the risk of targeted cyberattacks has increased. Hence, effectively defending against such attacks necessitates skilled cybersecurity professionals. Traditional human-based cyber-physical education is resource…
Descriptors: Artificial Intelligence, Information Security, Computer Security, Prevention

Peer reviewed
Direct link
