Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Source
T.H.E. Journal | 2 |
Advances in Engineering… | 1 |
Journal of Computing in… | 1 |
Journal of Information… | 1 |
TechTrends: Linking Research… | 1 |
Techniques: Connecting… | 1 |
Technology & Learning | 1 |
Author
Alper Yayla | 1 |
Bhunia, Swarup | 1 |
Branzburg, Jeffrey | 1 |
Descy, Don E. | 1 |
Dipti Kapoor Sarmah | 1 |
Ersin Dincelli | 1 |
Howell, Kevin R. | 1 |
Paul, Shubhra Deb | 1 |
Rajala, Judith B. | 1 |
Vasco Rikkers | 1 |
Waters, John K. | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 4 |
Reports - Research | 3 |
Opinion Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
Europe | 1 |
Florida | 1 |
Nevada | 1 |
North America | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
According to the National Safety Council, 63 million computers became obsolete in 2005 alone, and it is estimated that the total number in storage in 2007 numbers upwards of 500 million computers (Earth 911, 2007). This article describes the steps that one should take before disposing of an obsolete computer. First and foremost, all personal…
Descriptors: Conservation (Environment), Computers, Computer Security, Access to Information
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Howell, Kevin R. – Techniques: Connecting Education and Careers, 2006
This article features an assistant professor of technology who shares his story of near disaster and offers advice for others about protecting their data. The author presents steps that can be taken to prevent unexpected events from destroying data. The author strongly recommends using backup files as a way of securing computer files and data.…
Descriptors: Computer Security, Data, Computer Software, Computer Peripherals

Rajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet