Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Blindness | 2 |
Braille | 2 |
Educational Technology | 2 |
Students with Disabilities | 2 |
Teaching Methods | 2 |
Visual Impairments | 2 |
Access to Computers | 1 |
Active Learning | 1 |
Assistive Technology | 1 |
Camps | 1 |
More ▼ |
Author
Forney, Steven | 1 |
Hairston, Jesse R. | 1 |
Martin, Jason | 1 |
Sabados, William T. | 1 |
Smith, Derrick W. | 1 |
Waters, John K. | 1 |
Williams, Tania | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Reports - Research | 1 |
Education Level
High Schools | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hairston, Jesse R.; Smith, Derrick W.; Williams, Tania; Sabados, William T.; Forney, Steven – Journal of Science Education for Students with Disabilities, 2020
This work showcases specific adaptations used to make cybersecurity accessible to high school students with visual impairments and blindness (VIB). The rapidly growing field of cybersecurity demands a diverse workforce; however, barriers exist which can deter students with disabilities from studying cybersecurity, let alone pursuing a career in…
Descriptors: Visual Impairments, Blindness, High School Students, Computer Security
Martin, Jason – Journal of Science Education for Students with Disabilities, 2019
The scope of this article is to describe the creation and implementation of specialized adaptations used in teaching the subject of basic cryptography to students who are visually impaired or blind. Included is an overview of events held for visually impaired and blind transition age youth in Alabama and the methods used to engage this population…
Descriptors: Braille, Large Type Materials, Assistive Technology, Students with Disabilities
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment