Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 7 |
| Since 2007 (last 20 years) | 14 |
Descriptor
Source
Author
| Frydenberg, Mark | 2 |
| Yates, David J. | 2 |
| Babb, Jeffry S. | 1 |
| Campbell, Jackie | 1 |
| Carlin, Anna | 1 |
| Chen, Frankie | 1 |
| Conlon, Michael P. | 1 |
| Harrison, Warren | 1 |
| Hsin, Wen-Jung | 1 |
| Isaias, Pedro, Ed. | 1 |
| Johnson, Clare | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 10 |
| Reports - Research | 6 |
| Reports - Descriptive | 5 |
| Collected Works - Proceedings | 4 |
| Books | 1 |
| Opinion Papers | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 15 |
| Postsecondary Education | 14 |
| Elementary Secondary Education | 4 |
| Elementary Education | 2 |
| High Schools | 2 |
| Secondary Education | 2 |
| Adult Education | 1 |
| Two Year Colleges | 1 |
Audience
Location
| California | 2 |
| Massachusetts | 2 |
| Alabama | 1 |
| Algeria | 1 |
| Bulgaria | 1 |
| China | 1 |
| Germany | 1 |
| Hungary | 1 |
| India | 1 |
| Indonesia | 1 |
| Italy | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Johnson, Clare – Higher Education Pedagogies, 2019
Higher Education institutions understand that there is a need to embed professional skills within degree programmes. However, evidence shows that graduates, whilst having developed good theoretical knowledge, lack experience and confidence when entering the workplace. Employers view the importance of degree-related skills as only a part of the…
Descriptors: Foreign Countries, Computer Security, Student Projects, Active Learning
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Martin, Jason – Journal of Science Education for Students with Disabilities, 2019
The scope of this article is to describe the creation and implementation of specialized adaptations used in teaching the subject of basic cryptography to students who are visually impaired or blind. Included is an overview of events held for visually impaired and blind transition age youth in Alabama and the methods used to engage this population…
Descriptors: Braille, Large Type Materials, Assistive Technology, Students with Disabilities
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Mack Shelley, Editor; Omer Tayfur Ozturk, Editor – International Society for Technology, Education, and Science, 2024
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on April 27-30, 2024, in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, discuss theoretical and…
Descriptors: STEM Education, Second Language Learning, Second Language Instruction, English (Second Language)
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation
Harrison, Warren – Journal on Educational Resources in Computing, 2006
The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…
Descriptors: Computer Security, Computer System Design, Evidence, Crime
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
Hsin, Wen-Jung – InSight: A Collection of Faculty Scholarship, 2007
This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners' daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct,…
Descriptors: Student Motivation, Internet, Computer Networks, Computer Science Education

Peer reviewed
Direct link
