Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 6 |
| Since 2007 (last 20 years) | 7 |
Descriptor
| College Programs | 8 |
| Computer Security | 8 |
| Information Security | 4 |
| Privacy | 3 |
| Barriers | 2 |
| College Faculty | 2 |
| Comparative Analysis | 2 |
| Computer System Design | 2 |
| Crime | 2 |
| Database Management Systems | 2 |
| Electronic Learning | 2 |
| More ▼ | |
Source
Author
| Bandara, Arosha | 1 |
| Brown, Victoria | 1 |
| Caldwell, Helen | 1 |
| Catal, Cagatay | 1 |
| Dhillon, Harpal S. | 1 |
| Dhillon, Manpreet | 1 |
| Donmez, Emrah | 1 |
| Foltz, C. Bryan | 1 |
| Hentea, Mariana | 1 |
| Kasif, Ahmet | 1 |
| Leteane, Oratile | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 8 |
| Reports - Research | 6 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 8 |
| Postsecondary Education | 5 |
| Two Year Colleges | 2 |
Audience
Location
| Botswana | 1 |
| Indiana | 1 |
| United Kingdom | 1 |
| Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Catal, Cagatay; Ozcan, Alper; Donmez, Emrah; Kasif, Ahmet – Education and Information Technologies, 2023
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an…
Descriptors: Computer Security, Information Security, College Programs, Knowledge Level
Liu, Feihong; Tu, Manghui – Journal of Education and Learning (EduLearn), 2020
An educated workforce is essential to government and industry, hence the need to provide a high-quality workforce has been crucial in higher education academic program development. In the cybersecurity field, the situation is not quite satisfactory, the reason comes down to the fact that this new industry is lacking a portable and measurable…
Descriptors: Labor Force Development, Computer Security, College Programs, Computer Science Education
Pitman, Lora; Payne, Brian K.; Vandecar-Burdin, Tancy; Thorbjornsen, Lenora – Journal of Cybersecurity Education, Research and Practice, 2022
As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across…
Descriptors: College Students, STEM Education, Computer Security, Information Security
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
Moakofhi, Moakofhi; Leteane, Oratile; Phiri, Tawona; Pholele, Thato; Sebalatlheng, Perncy – International Journal of Education and Development using Information and Communication Technology, 2017
The integration of technology in the education process has immensely improved the acquisition and retention of knowledge. Although e-learning initiatives bring many advantages to the education system, these rewards have not been fully realised in developing countries like Botswana. Therefore, in the current study, authors set out to identify…
Descriptors: Foreign Countries, Electronic Learning, Barriers, Agricultural Education
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)

Peer reviewed
Direct link
