Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Models | 3 |
Information Security | 2 |
Case Studies | 1 |
Certification | 1 |
Classification | 1 |
Competence | 1 |
Computer Science Education | 1 |
Curriculum Design | 1 |
Definitions | 1 |
Education Work Relationship | 1 |
More ▼ |
Author
Abdollah, Faizal Mohd | 1 |
Bendler, Daniel | 1 |
Felderer, Michael | 1 |
Knapp, Kenneth J. | 1 |
Mahalingam, Sheila | 1 |
Maurer, Christopher | 1 |
Plachkinova, Miloslava | 1 |
Sahib, Shahrin | 1 |
Publication Type
Information Analyses | 3 |
Journal Articles | 2 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bendler, Daniel; Felderer, Michael – ACM Transactions on Computing Education, 2023
Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the…
Descriptors: Models, Information Security, Computer Security, Competence
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin – International Association for Development of the Information Society, 2014
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
Descriptors: Electronic Learning, Computer Security, Reliability, Trust (Psychology)
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification