Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 8 |
Descriptor
Source
ACM Transactions on Computing… | 1 |
Education and Information… | 1 |
Educational Technology &… | 1 |
Executive Office of the… | 1 |
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Author
Figueira, Álvaro | 1 |
Jan Vykopal | 1 |
Ján Dovjak | 1 |
Leal, José Paulo | 1 |
Lin, Yu-Tzu | 1 |
Lori L. Sussman | 1 |
Mark Monnin | 1 |
Marquardson, Jim | 1 |
Paiva, José Carlos | 1 |
Pavel Celeda | 1 |
Pentang, Jupeth T. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Paiva, José Carlos; Leal, José Paulo; Figueira, Álvaro – ACM Transactions on Computing Education, 2022
Practical programming competencies are critical to the success in computer science (CS) education and go-to-market of fresh graduates. Acquiring the required level of skills is a long journey of discovery, trial and error, and optimization seeking through a broad range of programming activities that learners must perform themselves. It is not…
Descriptors: Automation, Computer Assisted Testing, Student Evaluation, Computer Science Education
Tsai, Cheng-Ting; Wu, Ja-Ling; Lin, Yu-Tzu; Yeh, Martin K.-C. – Educational Technology & Society, 2022
With the rapid increase of online learning and online degree programs, the need for a secure and fair scoring mechanisms in online learning becomes urgent. In this research, a secure scoring mechanism was designed and developed based on blockchain technology to build transparent and fair interactions among students and teachers. The proposed…
Descriptors: Electronic Learning, Online Courses, Computer Security, Scoring
Pentang, Jupeth T. – Online Submission, 2021
Globalizations across organizations are impacted by economic, political, legal, security, social, cultural, ecological, and technological dimensions among others. This paper presents the readings from relevant articles and studies pertaining to the relationship between technology and its dimensions with globalization. Globalization and…
Descriptors: Global Approach, Technology Education, Technology Uses in Education, Educational Trends
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Executive Office of the President, 2016
Advances in Artificial Intelligence (AI) technology have opened up new markets and new opportunities for progress in critical areas such as health, education, energy, and the environment. In recent years, machines have surpassed humans in the performance of certain specific tasks, such as some aspects of image recognition. Experts forecast that…
Descriptors: Artificial Intelligence, Federal Government, Federal Regulation, Research and Development