Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 16 |
Since 2006 (last 20 years) | 35 |
Descriptor
Source
Author
Abdel-Maksoud, Nahed F. | 1 |
Abdrabou, Atef | 1 |
Abdullahim, Mohammed | 1 |
Ambraziene, Danute | 1 |
Archer, Ricky | 1 |
Bhunia, Swarup | 1 |
Bichelmeyer, Barbara A. | 1 |
Blanes, Ian | 1 |
Borrego, Carlos | 1 |
Bothe, Klaus | 1 |
Budimac, Zoran | 1 |
More ▼ |
Publication Type
Journal Articles | 36 |
Reports - Research | 19 |
Reports - Descriptive | 13 |
Reports - Evaluative | 4 |
Tests/Questionnaires | 2 |
Collected Works - Proceedings | 1 |
Information Analyses | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Location
Egypt | 2 |
Florida | 2 |
Germany | 2 |
Missouri | 2 |
Ohio | 2 |
Pennsylvania | 2 |
Spain | 2 |
Albania | 1 |
Asia | 1 |
Australia | 1 |
Bosnia and Herzegovina | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ramos, Júlio Cesar; L'Erario, Alexandre; Mendonça, Marcio; Fabri, José Augusto; Palácios, Rodrigo Henrique Cunha – Education and Information Technologies, 2023
The freshman student's perspective on the activities performed in a data center by the network analyst is complex and intricate. These activities include the configuration of equipment and the connection between network devices. There are several issues with these activities that demand technical knowledge. Questions such as: "what does this…
Descriptors: Game Based Learning, College Freshmen, Computer Science Education, Computer Networks
Luse, Andy; Rursch, Julie – British Journal of Educational Technology, 2021
Engineering and technology educators continually strive for realistic, hands-on laboratory exercises to enhance their students' learning. This research describes the redesign of an undergraduate introductory computer networking course to include new weekly virtual laboratory assignments that culminate in a 'real world' final project of configuring…
Descriptors: Experiential Learning, Computer Science Education, Curriculum Design, Undergraduate Study
Olelewe, Chijioke Jonathan; Dong, Chunli; Abdullahim, Mohammed; Nwangwu, Chinweike Emmanuel – Technology, Pedagogy and Education, 2023
This study determined the efficacy of the video-clip lecture strategy in enhancing computer science (CS) students' performance in a computer networking course at universities in Gombe state, Nigeria. The study adopted a quasi-experimental design with non-equivalent groups of intact classes. Study participants were 136 CS third-year students made…
Descriptors: Foreign Countries, Instructional Effectiveness, Video Technology, Lecture Method
Ciuffoletti, Augusto – IEEE Transactions on Education, 2021
Contribution: A technical course in a multidisciplinary university program has to provide high-level skills, with limited lecturing hours and student background. This article investigates the principles for its design and reports about a study case. Background: The overall course organization needs to address specific learning targets and teaching…
Descriptors: Curriculum Design, Course Organization, Computer Networks, Course Evaluation
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Abdrabou, Atef; Shakhatreh, Walid – Journal of Technology and Science Education, 2021
In the era of the Internet-of-everything, learning the principles of data communications and networking is inevitable for many electrical engineering disciplines. The paper addresses the effectiveness of teaching the fundamentals of data communications and networking using a dedicated lab course as a co-requisite to a classic lecture-based course.…
Descriptors: Computer Networks, Computer Science Education, Engineering Education, Instructional Effectiveness
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Öncü, Semiral; Bichelmeyer, Barbara A. – Participatory Educational Research, 2021
Learners have to engage in academically purposeful instructional endeavors to be successful in school. Latest research indicates that the learners of today are not as interested in educational deeds as they need to be. Educational stakeholders should look for means to address this tendency to have a positive influence on educational results. This…
Descriptors: Instructional Effectiveness, Learner Engagement, Blended Learning, Educational Certificates
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Marquardson, Jim; Gomillion, David L. – Information Systems Education Journal, 2019
Simulated environments can provide a convenient, effective way to teach skills. Simulations have been used for decades to teach skills such as piloting aircraft. As technology has improved, it has become feasible to simulate many other tasks. Recent advances in virtual and augmented reality provide new avenues for expanding training using…
Descriptors: Computer Simulation, Teaching Methods, Transfer of Training, Introductory Courses
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Abdel-Maksoud, Nahed F. – International Journal of Education and Practice, 2018
Virtualization technology has been around for many years, and its use is increasingly becoming common in education, in general and in computing fields, in particular. This can be attributed partly to its potential to reduce costs, boost efficiency and overcome limited resources through its virtual applications such as servers, storage devices and…
Descriptors: Electronic Learning, Educational Environment, Educational Quality, Instructional Effectiveness