Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 18 |
Since 2006 (last 20 years) | 26 |
Descriptor
Source
Author
Wang, Jianjun | 2 |
Abdolahifard, Khadije | 1 |
Acheampong, Zoe | 1 |
Agerwala, Tilak | 1 |
Akhavan, Peyman | 1 |
Apuke, Oberiri Destiny | 1 |
Arefi, Majid Feyz | 1 |
Babb, Jeffry S. | 1 |
Bakardjieva, Teodora | 1 |
Bell, Kevin R. | 1 |
Bhunia, Swarup | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 26 |
Postsecondary Education | 26 |
High Schools | 3 |
Secondary Education | 3 |
Elementary Secondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
California | 2 |
Iran | 2 |
Australia | 1 |
Austria (Vienna) | 1 |
Bulgaria | 1 |
Cameroon | 1 |
Europe | 1 |
Florida | 1 |
Kenya | 1 |
Massachusetts | 1 |
New York | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Bottum, Jim; Smith, Dale; Grandon, Alex; Hofmann, Russell – Tribal College Journal of American Indian Higher Education, 2022
For a tribal college or university (TCU), cyberinfrastructure includes not only the campus computer labs, servers, routers, and software applications, but the classroom technology, research laboratories, library facilities, and personnel who operate and maintain these resources. The cyberinfrastructure at a TCU is a foundational tool that ties the…
Descriptors: Capacity Building, Information Technology, Computer Networks, Tribally Controlled Education
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
West, Deborah; Luzeckyj, Ann; Searle, Bill; Toohey, Danny; Vanderlelie, Jessica; Bell, Kevin R. – Australasian Journal of Educational Technology, 2020
This article reports on a study exploring student perspectives on the collection and use of student data for learning analytics. With data collected via a mixed methods approach from 2,051 students across six Australian universities, it provides critical insights from students as a key stakeholder group. Findings indicate that while students are…
Descriptors: Stakeholders, Undergraduate Students, Graduate Students, Student Attitudes
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
The ability to securely connect to virtual systems is an important element within a safe and supportive learning environment. This is particularly the case within institutions of higher education (IHEs), where students are increasingly learning in digital formats; faculty, staff, and visitors are constantly accessing and sharing information…
Descriptors: Computer Security, Information Security, Higher Education, Universities
Dogari, Kwase Andu; Apuke, Oberiri Destiny – Turkish Online Journal of Distance Education, 2019
The discussion and debate on integrating social media into the formal education remain largely speculative rather than well informed and certain. Only limited studies and mainly from developed nations attempted to describe specific learning gains and benefits of social media as a formal tool in the learning environment. Studies that attempt to…
Descriptors: Social Media, Cooperative Learning, Foreign Countries, Teaching Methods
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Previous Page | Next Page »
Pages: 1 | 2