Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 6 |
Descriptor
Source
Information Systems Education… | 2 |
Advanced Distributed Learning… | 1 |
Advances in Engineering… | 1 |
E-Learning and Digital Media | 1 |
Journal of Technology and… | 1 |
Author
Babb, Jeffry S. | 1 |
Bhunia, Swarup | 1 |
Blanes, Ian | 1 |
Borrego, Carlos | 1 |
Chawinga, Winner Dominic | 1 |
Chen, Frankie | 1 |
Craig, Scotty D. | 1 |
Fernández, Cristina | 1 |
Frydenberg, Mark | 1 |
Goldstein, Ira | 1 |
McDermott, Isabelle | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 4 |
Reports - Descriptive | 2 |
Tests/Questionnaires | 2 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Audience
Location
Arizona | 1 |
Florida | 1 |
Malawi | 1 |
Massachusetts | 1 |
Spain (Barcelona) | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
What! No GUI? -- Teaching a Text Based Command Line Oriented Introduction to Computer Science Course
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Chawinga, Winner Dominic – E-Learning and Digital Media, 2016
It is understood that microblogging (tweeting) which is a form of Web 2.0, has been a centre of attraction in some institutions of higher education. However, despite its hype and pomp as reported by some scholars in developed countries, integration of Twitter in a classroom environment in developing countries is just beginning to flourish. In…
Descriptors: Social Media, Electronic Publishing, Course Content, Foreign Countries