Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Advances in Engineering… | 1 |
American Journal of Business… | 1 |
Journal of Cybersecurity… | 1 |
ProQuest LLC | 1 |
Author
Bhunia, Swarup | 1 |
Chou, Te-Shun | 1 |
Guynes, Carl S. | 1 |
Hempenius, Nicholas | 1 |
Jensen, Bradley K. | 1 |
Nyaboga, Andrew | 1 |
Paul, Shubhra Deb | 1 |
Yang, Shuo | 1 |
Yuli Deng | 1 |
Publication Type
Journal Articles | 3 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yuli Deng – ProQuest LLC, 2021
Personalized learning is gaining popularity in online computer science education due to its characteristics of pacing the learning progress and adapting the instructional approach to each individual learner from a diverse background. Among various instructional methods in computer science education, hands-on labs have unique requirements of…
Descriptors: Individualized Instruction, Experiential Learning, Computer Science Education, Electronic Learning
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching