Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Author
Astrom, Peik | 1 |
Babb, Jeffry S. | 1 |
Bergstrom, Laura | 1 |
Bhunia, Swarup | 1 |
Blanes, Ian | 1 |
Borrego, Carlos | 1 |
Brabston, Mary | 1 |
Chawinga, Winner Dominic | 1 |
Chen, Fang | 1 |
Chen, Frankie | 1 |
Craig, Scotty D. | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 8 |
Reports - Research | 4 |
Speeches/Meeting Papers | 2 |
Tests/Questionnaires | 2 |
Guides - Classroom - Learner | 1 |
Education Level
Higher Education | 13 |
Postsecondary Education | 7 |
Adult Education | 1 |
Two Year Colleges | 1 |
Audience
Students | 1 |
Location
Finland | 2 |
Arizona | 1 |
Australia | 1 |
Canada | 1 |
Florida | 1 |
Italy | 1 |
Malawi | 1 |
Massachusetts | 1 |
Spain (Barcelona) | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Ntogramatzidis, Lorenzo; Zanasi, Roberto; Cuoghi, Stefania – IEEE Transactions on Education, 2014
This paper describes a range of design techniques for standard compensators (Lead-Lag networks and PID controllers) that have been applied to the teaching of many undergraduate control courses throughout Italy over the last twenty years, but that have received little attention elsewhere. These techniques hinge upon a set of simple formulas--herein…
Descriptors: Instructional Innovation, Design Requirements, Course Descriptions, Electronic Equipment
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Chawinga, Winner Dominic – E-Learning and Digital Media, 2016
It is understood that microblogging (tweeting) which is a form of Web 2.0, has been a centre of attraction in some institutions of higher education. However, despite its hype and pomp as reported by some scholars in developed countries, integration of Twitter in a classroom environment in developing countries is just beginning to flourish. In…
Descriptors: Social Media, Electronic Publishing, Course Content, Foreign Countries
Chen, Fang; Brabston, Mary – Journal of Information Systems Education, 2011
We implemented two local area network (LAN) projects in our introductory data communications and networking course. The first project required students to develop a LAN from scratch for a small imaginary organization. The second project required student groups to analyze a LAN for a real world small organization. By allowing students to apply what…
Descriptors: Computer Networks, Information Science Education, Information Networks, Theory Practice Relationship
Tan, Grace; Venables, Anne – Journal of Information Technology Education, 2010
Since 2001, there has been a dramatic decline in Information Technology and Computer Science student enrolments worldwide. As a consequence, many institutions have evaluated their offerings and revamped their programs to include units designed to capture students' interests and increase subsequent enrolment. Likewise, at Victoria University the…
Descriptors: Curriculum Development, Information Technology, Curriculum Design, Computer Science Education
Cronin, John J. – Journal of Marketing Education, 2009
Wikis are one of the newest features of Web 2.0. This article describes the implementation of a project in a marketing course in which students created an interactive textbook using wiki software. Several surprises encountered along the way are described, and the unique problem of grading individual contributions to a wiki is discussed. The author…
Descriptors: Marketing, Educational Technology, Hypermedia, Cooperative Learning
Alberta Advanced Education and Technology, 2009
The graduate of the Communication Technician apprenticeship program is a certified journeyperson who will be able to: (1) supervise, train and coach apprentices; (2) use a thorough knowledge of electrical and electronic theory and its application to communication and associated equipment used in the telecommunication industry; (3) understand…
Descriptors: Foreign Countries, Paraprofessional Personnel, Apprenticeships, Telecommunications
Ercan, Tuncay; Sahin, Yasar Guneri – Online Submission, 2007
Course descriptions prepared by the lecturers in the beginning of the academic year do not get any feed back from the students enrolled it. These syllabuses are not only used for the future semesters, but also used by the other lecturers without even making any changes. This causes a negative effect on the student education since many of the…
Descriptors: Knowledge Level, Measures (Individuals), Course Descriptions, Computer Networks
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks
Surakka, Sami; Malmi, Lauri – Computer Science Education, 2005
This case study considered the syllabus of the first and second year studies in computer science. The aim of the study was to reveal which topics covered in the syllabi were really needed during the following years of study or in working life. The program that was assessed in the study was a Masters program in computer science and engineering at a…
Descriptors: Masters Programs, Computer Science, Engineering Education, Foreign Countries