NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20242
Since 2021 (last 5 years)6
Since 2016 (last 10 years)13
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Jirong Yi – ProQuest LLC, 2021
We are currently in a century of data where massive amount of data are collected and processed every day, and machine learning plays a critical role in automatically processing the data and mining useful information from it for making decisions. Despite the wide and successful applications of machine learning in different fields, the robustness of…
Descriptors: Artificial Intelligence, Algorithms, Data, Classification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Burrows, Andrea C.; Borowczak, Mike; Mugayitoglu, Bekir – Education Sciences, 2022
Computer science, cybersecurity education, and microcredentials are becoming more pervasive in all levels of the educational system. The purpose of this study was partnering with precollegiate teachers: (1) to investigate the self-efficacy of 30 precollegiate teacher participants towards computer science before, during, and after three iterations…
Descriptors: Computer Science Education, Computer Security, Coding, Partnerships in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Debnath, Diptasree; Ghosh, Emlon; Banik, Barnali Gupta – International Journal of Web-Based Learning and Teaching Technologies, 2020
Steganography is a widely-used technique for digital data hiding. Image steganography is the most popular among all other kinds of steganography. In this article, a novel key-based blind method for RGB image steganography where multiple images can be hidden simultaneously is described. The proposed method is based on Discrete Cosine Transformation…
Descriptors: Computer Security, Information Security, Privacy, Color
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Jeong; Lee, Young; Fernandez, Amanda; Sanchez, Joshua – Journal of Cybersecurity Education, Research and Practice, 2020
As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure…
Descriptors: Computer Security, Programming Languages, Programming, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler – Journal of Educational Computing Research, 2018
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Descriptors: Computer Security, Programming, Coding, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Buchanan, Rachel; Southgate, Erica; Smith, Shamus P.; Murray, Tiana; Noble, Brittany – E-Learning and Digital Media, 2017
Given that today's children are prolific users of the internet, concern has been raised about the future impact of the digital footprints they are currently generating. Here, we report on the "Best Footprint Forward" project which utilised focus groups to investigate the digital footprint awareness of 33 children (ranging in age from 10…
Descriptors: Internet, Preadolescents, Elementary School Students, Computer Use
Peer reviewed Peer reviewed
Direct linkDirect link
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming
Walton, Marquetta – ProQuest LLC, 2016
The effectiveness of U.S. cyber-capabilities can have a serious effect on the cyber-security stance of the US and significantly impact how well U.S. critical infrastructures are protected. The problem is that the state of the U.S. cyber-security could be negatively impacted by the dependency that the US displays in its use of defensive…
Descriptors: Technological Literacy, Computer Security, Information Security, Qualitative Research
New England Board of Higher Education, 2018
Surveys of New England employers, college academic officers, and graduates find that many consider today's college graduates inadequately prepared for the world of work. In 2017, the New England Board of Higher Education convened the Commission on Higher Education & Employability, under the leadership of Rhode Island Governor Gina M. Raimondo.…
Descriptors: Education Work Relationship, Employment Potential, College Graduates, Career Readiness