Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 13 |
Descriptor
Source
Author
Abhishek Vaish | 1 |
Bhunia, Swarup | 1 |
Bromall, Natalya | 1 |
Carlos Novo | 1 |
De Neuter, Nicolas | 1 |
Draus, Peter | 1 |
Emery-Wetherell, Meaghan | 1 |
Eyckmans, Marleen | 1 |
Frank Xavier Gearhart | 1 |
Frydenberg, Mark | 1 |
Hayden, Trey | 1 |
More ▼ |
Publication Type
Journal Articles | 11 |
Reports - Research | 7 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 1 |
Guides - Classroom - Learner | 1 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Audience
Students | 1 |
Location
Australia | 1 |
Belgium | 1 |
Florida | 1 |
Spain (Barcelona) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Jordi Guitart; Juan José Costa – Interactive Learning Environments, 2024
The pandemic situation banned the presence of teachers and students in the classrooms disrupting the typical teaching process. Videoconferencing services have been used successfully for lectures, but they are insufficient for hands-on laboratories where the physical presence is a requirement (i.e. to access specific hardware). Enabling remote…
Descriptors: Distance Education, Laboratories, Computer Networks, Videoconferencing
Mat Bettinson; Steven Bird – Language Documentation & Conservation, 2021
Mobile apps have the potential to support collaborative fieldwork even where web connectivity is unreliable or unavailable. To explore this potential, we developed portable network infrastructure and custom-made field tool apps. We deployed this solution in remote communities in the far north of Australia, in connection with co-located cooperative…
Descriptors: Language Research, Documentation, Language Maintenance, Computer Software
Emery-Wetherell, Meaghan; Wang, Ruoyao – Assessment & Evaluation in Higher Education, 2023
Over four semesters of a large introductory statistics course the authors found students were engaging in contract cheating on Chegg.com during multiple choice examinations. In this paper we describe our methodology for identifying, addressing and eventually eliminating cheating. We successfully identified 23 out of 25 students using a combination…
Descriptors: Computer Assisted Testing, Multiple Choice Tests, Cheating, Identification
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
K. Kavitha; V. P. Joshith – Journal of Pedagogical Research, 2024
Artificial intelligence (AI) technologies continue to revolutionize various sectors, including their incorporation into education, particularly in K-12 science education, which has become evidently significant. This paper presents a bibliometric analysis and systematic review that examines the incorporation of AI technologies in K-12 science…
Descriptors: Artificial Intelligence, Science Education, Elementary School Science, Secondary School Science
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Laukens, Kris; Eyckmans, Marleen; De Neuter, Nicolas; Naulaerts, Stefan; Meysman, Pieter; Van Ostade, Xaveer – Journal of Biological Education, 2021
While computational biology and bioinformatics became an inherent part of most life science degrees, it remains challenging to encourage students to employ these diverse skills in a practical research context. In this education paper, we present a method to enable students to acquire hands-on skills by the data-driven study of complex biomolecular…
Descriptors: Data Analysis, Communicable Diseases, Molecular Biology, Science Instruction