NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20250
Since 2022 (last 5 years)4
Since 2017 (last 10 years)8
Since 2007 (last 20 years)10
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Catal, Cagatay; Ozcan, Alper; Donmez, Emrah; Kasif, Ahmet – Education and Information Technologies, 2023
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an…
Descriptors: Computer Security, Information Security, College Programs, Knowledge Level
Patrick Ward – ProQuest LLC, 2024
This proposal is to develop a framework for designing a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges such as program accreditation, workforce development, and Department of Homeland Security/National Security Agency…
Descriptors: Community Colleges, College Programs, Computer Security, Internet
Childs, Dawn – ProQuest LLC, 2023
Cyberattacks in the United States have consistently increased over recent years, and there is no apparent end to this upward trend. The increase in these attacks has resulted in successful cyber incidents and breaches of large, small, and medium-sized organizations across varied locales and industries. The hospitality industry has not been immune…
Descriptors: Hospitality Occupations, Professional Education, Curriculum, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Liu, Feihong; Tu, Manghui – Journal of Education and Learning (EduLearn), 2020
An educated workforce is essential to government and industry, hence the need to provide a high-quality workforce has been crucial in higher education academic program development. In the cybersecurity field, the situation is not quite satisfactory, the reason comes down to the fact that this new industry is lacking a portable and measurable…
Descriptors: Labor Force Development, Computer Security, College Programs, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pitman, Lora; Payne, Brian K.; Vandecar-Burdin, Tancy; Thorbjornsen, Lenora – Journal of Cybersecurity Education, Research and Practice, 2022
As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across…
Descriptors: College Students, STEM Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Moakofhi, Moakofhi; Leteane, Oratile; Phiri, Tawona; Pholele, Thato; Sebalatlheng, Perncy – International Journal of Education and Development using Information and Communication Technology, 2017
The integration of technology in the education process has immensely improved the acquisition and retention of knowledge. Although e-learning initiatives bring many advantages to the education system, these rewards have not been fully realised in developing countries like Botswana. Therefore, in the current study, authors set out to identify…
Descriptors: Foreign Countries, Electronic Learning, Barriers, Agricultural Education
Peer reviewed Peer reviewed
Direct linkDirect link
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Atkinson, Al – British Columbia Council on Admissions and Transfer, 2009
The Education Planner website provides a searchable database of approximately 1,700 undergraduate post-secondary programs in British Columbia (BC). It is intended as a "one-start entry point" for students looking for post-secondary options. This independent review of Education Planner was undertaken to determine its overall…
Descriptors: Web Sites, Postsecondary Education, Undergraduate Study, Databases