Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 4 |
Computer Software | 4 |
Computer Science Education | 2 |
Information Technology | 2 |
Programming | 2 |
Administrator Attitudes | 1 |
Advertising | 1 |
Animation | 1 |
Athletic Coaches | 1 |
Biological Sciences | 1 |
Coding | 1 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Chronicle of Higher Education | 1 |
Journal of Educational… | 1 |
ProQuest LLC | 1 |
Author
Archer, Ricky | 1 |
Chu, Bill | 1 |
Lipford, Heather Richter | 1 |
Qadah, Yaseen | 1 |
Thomas, Tyler | 1 |
Vega, Percy | 1 |
Whitney, Michael | 1 |
Wilson, Darrell G. | 1 |
Xu, Jinsheng | 1 |
Yu, Huiming | 1 |
Yuan, Xiaohong | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
North Carolina | 4 |
Delaware | 1 |
South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler – Journal of Educational Computing Research, 2018
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Descriptors: Computer Security, Programming, Coding, Computer Science Education
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This September 24, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Thank You, Masked Man" (Reilly, Liam); (2) "The Trailing-Spouse…
Descriptors: Higher Education, Biological Sciences, Scholarship, College Faculty