Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 16 |
Descriptor
Source
Author
Alexandra Rysul'ova | 1 |
Allison, Jordan | 1 |
Amy J. Connolly | 1 |
Brandi Robinson | 1 |
Brown-Devlin, Natalie | 1 |
Daniel E. Rush | 1 |
Darmody, Aron | 1 |
Ford, Vitaly | 1 |
Gao, Guandong | 1 |
Gary G. Bitter | 1 |
Ibrahim, Ahmed | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Research | 9 |
Reports - Descriptive | 5 |
Tests/Questionnaires | 3 |
Speeches/Meeting Papers | 2 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 10 |
Audience
Teachers | 2 |
Location
Pennsylvania | 1 |
South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Whyte, Christopher – Journal of Political Science Education, 2021
This essay outlines a set of mini-games designed to more effectively allow political science instructors, particularly in International Relations, teach basic principles and concepts associated with digital insecurity and cyber conflict. This topic, increasingly significant in IR syllabi in recent years, is in many cases considered with…
Descriptors: Game Based Learning, Political Science, Information Security, Active Learning
Gao, Guandong; Xiao, Ke; Jia, Yuchen; Wang, Huaying – Innovations in Education and Teaching International, 2022
To improve the practical effect of an information system security course for students majoring in information security, a teaching method based on the theory of inventive problem solving (TIPS) that combines case-based teaching and project practice was introduced in the class. Adopting innovative thinking methods, we instructed students on the…
Descriptors: Problem Solving, Information Security, Information Science Education, Case Method (Teaching Technique)
Ibrahim, Ahmed; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2021
DETERLab is a cluster environment that provides a set of virtual machines that can be used by researchers and teachers to run cybersecurity experiments and competitions, and where it is possible to deploy different network configurations to research attack and defense mechanisms in the cyber world. While we were working to develop a pathway for…
Descriptors: Information Security, Computer Security, Educational Resources, Active Learning
Kim, Sang Soo – Interactive Learning Environments, 2023
As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary to explore the motivators and barriers to student engagement comprehensively. Given the nature of an online learning environment, this study specifically focused on security…
Descriptors: Online Courses, Universities, COVID-19, Pandemics
Kishor Datta Gupta – ProQuest LLC, 2021
Defenses against adversarial attacks are essential to ensure the reliability of machine learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations in practical use. I proposed a trustworthy framework that employs an adaptive strategy to inspect both inputs and decisions. In…
Descriptors: Artificial Intelligence, Cybernetics, Information Processing, Information Security
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
Maxworth, Ashanthi – Advances in Engineering Education, 2021
This paper presents the implementation of a case study analysis in an introductory level electrical circuits course. According to the author's knowledge, this is the first time hybrid implementation of a case study analysis with problem-based learning (PBL) and virtual experimentation (VE) was used in an introductory level electrical circuits…
Descriptors: Engineering Education, Problem Based Learning, Feedback (Response), Introductory Courses
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Brown-Devlin, Natalie – Journal of Advertising Education, 2021
As the advertising industry continues to list analytical reasoning as a necessary skill for employment, more universities are including analytics into their advertising curriculum. This article outlines how I teach an analytics-focused course in a top-ranked advertising program. In this article, I briefly summarize each course module and describe…
Descriptors: Advertising, Teaching Methods, Data Analysis, College Faculty
Rusen Meylani; Gary G. Bitter – International Society for Technology, Education, and Science, 2023
The "App-Generation" the present student population that grew up in a world of digital technology and mobile apps faces obstacles explored in this article. It explores their traits, such as multitasking, limited attention spans, and technology fluency, and how these affect their involvement in and experiences with learning. The article…
Descriptors: Academic Achievement, High Achievement, Individual Characteristics, Student Projects
Previous Page | Next Page »
Pages: 1 | 2