Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 7 |
Descriptor
Computer Security | 7 |
Guidelines | 7 |
Information Security | 5 |
Computer Science Education | 3 |
Foreign Countries | 3 |
Standards | 3 |
Audits (Verification) | 2 |
Compliance (Legal) | 2 |
Crime | 2 |
Educational Objectives | 2 |
Ethics | 2 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
European Journal of Education | 1 |
Higher Education, Skills and… | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Technology and… | 1 |
Malaysian Online Journal of… | 1 |
Author
Abdel-Karim Al-Tamimi | 1 |
Bernard Ngalim | 1 |
Daisy Imbaquingo | 1 |
Javier Díaz | 1 |
José Jácome | 1 |
K. Thiyagu | 1 |
Kalle Grill | 1 |
Karin Danielsson | 1 |
Khalid Samara | 1 |
Lena Enqvist | 1 |
Loïs Vanhée | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 4 |
Reports - Descriptive | 3 |
Audience
Practitioners | 1 |
Location
Cameroon | 1 |
Malaysia | 1 |
Netherlands | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Seng Thah, Soon – International Journal of Computer-Assisted Language Learning and Teaching, 2022
This study was conducted to determine the level of ICT competencies among Malaysian language teachers at both primary and secondary schools. The focus of this study was on four specific domains: 1) technological concepts and operational skills; 2) pedagogical skills; 3) professional skills; and 4) social, ethics, and security skills. These skills…
Descriptors: Language Teachers, Pedagogical Content Knowledge, Second Language Learning, Second Language Instruction