Cybersecurity and Digital Education

A special issue of Education Sciences (ISSN 2227-7102).

Deadline for manuscript submissions: closed (15 April 2021) | Viewed by 5724

Special Issue Editors


E-Mail Website
Guest Editor
Department of Didactics and School Organization, University of Granada, 51001 Ceuta, Spain
Interests: didactics; teaching and learning; ICT; E-learning; school organization; educational supervision
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Didactic and School Organization, University of Granada, Campus Universitario de Cartuja S/N, 18071 Granada, Spain
Interests: information and communication technologies (ICT) and educational innovation; active methodologies at university; teacher training in higher education and digital competence
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear colleagues,

The presence and impact of ICT within the educational environment today is indisputable, and thus, a responsible and safe behavior toward different devices and networks has become essential. The internet and social networks and their irruption in all areas of life have changed the forms of communication and interaction and how privacy had previously been understood. Therefore, we advocate an educational model that promotes digital competence, both of teachers and students, prioritizing a motivated use of different educational agents. This approach is certain of all the elements and factors involved in this learning.

This proposal arises from the need to focus on the inclusion of technology in education toward a more complete paradigm, where good use is made of its multifunctionality, understood as a transversal element, despite the fact that in certain circumstances, the application of ICT to education has been different, and detrimental to cooperation. Thus, a profile is advocated for the 21st century where teachers and students, regardless of the educational stage they are in, go beyond the instrument and its correct use at the level of hardware and software. The very awareness of the implications and consequences of the current use of this technology, and how to manage their own identity and privacy is the basis from which one must start to be digitally competent.

Dr. Juan Manuel Trujillo Torres
Dr. Antonio José Moreno Guerrero
Dr. Carmen Rodríguez Jiménez
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a double-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Education Sciences is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • ICT
  • information security
  • safety education

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 453 KiB  
Article
Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity
by Shaya Wolf, Andrea Carneal Burrows, Mike Borowczak, Mason Johnson, Rafer Cooley and Kyle Mogenson
Educ. Sci. 2020, 10(12), 353; https://doi.org/10.3390/educsci10120353 - 26 Nov 2020
Cited by 9 | Viewed by 4720
Abstract
Research on innovative, integrated outreach programs guided three separate week-long outreach camps held across two summers (2018 and 2019). These camps introduced computer science through real-world applications and hands-on activities, each dealing with cybersecurity principles. The camps utilized low-cost hardware and free software [...] Read more.
Research on innovative, integrated outreach programs guided three separate week-long outreach camps held across two summers (2018 and 2019). These camps introduced computer science through real-world applications and hands-on activities, each dealing with cybersecurity principles. The camps utilized low-cost hardware and free software to provide a total of 84 students (aged 10 to 18 years) a unique learning experience. Based on feedback from the 2018 camp, a new pre/post survey was developed to assess changes in participant knowledge and interest. Student participants in the 2019 iteration showed drastic changes in their cybersecurity content recall (33% pre vs. 96% post), cybersecurity concept identification within real-world scenarios, and exhibited an increased ability to recognize potential cybersecurity threats in their every-day lives (22% pre vs. 69% post). Finally, students’ self-reported interest-level before and after the camp show a positive increase across all student participants, with the number of students who where highly interested in cybersecurity more than doubling from 31% pre-camp to 65% post-camp. Implications for educators are large as these activities and experiences can be interwoven into traditional schooling as well as less formal camps as pure computer science or through integrated STEM. Full article
(This article belongs to the Special Issue Cybersecurity and Digital Education)
Show Figures

Figure 1

Back to TopTop