Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 11 |
Since 2016 (last 10 years) | 31 |
Since 2006 (last 20 years) | 106 |
Descriptor
Source
Author
Nickerson, Gord | 6 |
Breeding, Marshall | 4 |
Descy, Don E. | 4 |
Harris, Judi | 3 |
Machovec, George S. | 3 |
Basch, Reva | 2 |
Coffman, Steve | 2 |
Falk, Howard | 2 |
Johnson, Doug | 2 |
Koren, Judy | 2 |
Lockwood, Russ | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 29 |
Teachers | 12 |
Administrators | 11 |
Media Staff | 3 |
Policymakers | 3 |
Researchers | 2 |
Students | 2 |
Community | 1 |
Parents | 1 |
Location
Australia | 5 |
Spain | 5 |
United Kingdom | 5 |
Canada | 4 |
Arizona | 3 |
Kansas | 3 |
Maryland | 3 |
Michigan | 3 |
South Africa | 3 |
United States | 3 |
Virginia | 3 |
More ▼ |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Jordi Guitart; Juan José Costa – Interactive Learning Environments, 2024
The pandemic situation banned the presence of teachers and students in the classrooms disrupting the typical teaching process. Videoconferencing services have been used successfully for lectures, but they are insufficient for hands-on laboratories where the physical presence is a requirement (i.e. to access specific hardware). Enabling remote…
Descriptors: Distance Education, Laboratories, Computer Networks, Videoconferencing
Mat Bettinson; Steven Bird – Language Documentation & Conservation, 2021
Mobile apps have the potential to support collaborative fieldwork even where web connectivity is unreliable or unavailable. To explore this potential, we developed portable network infrastructure and custom-made field tool apps. We deployed this solution in remote communities in the far north of Australia, in connection with co-located cooperative…
Descriptors: Language Research, Documentation, Language Maintenance, Computer Software
Emery-Wetherell, Meaghan; Wang, Ruoyao – Assessment & Evaluation in Higher Education, 2023
Over four semesters of a large introductory statistics course the authors found students were engaging in contract cheating on Chegg.com during multiple choice examinations. In this paper we describe our methodology for identifying, addressing and eventually eliminating cheating. We successfully identified 23 out of 25 students using a combination…
Descriptors: Computer Assisted Testing, Multiple Choice Tests, Cheating, Identification
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
K. Kavitha; V. P. Joshith – Journal of Pedagogical Research, 2024
Artificial intelligence (AI) technologies continue to revolutionize various sectors, including their incorporation into education, particularly in K-12 science education, which has become evidently significant. This paper presents a bibliometric analysis and systematic review that examines the incorporation of AI technologies in K-12 science…
Descriptors: Artificial Intelligence, Science Education, Elementary School Science, Secondary School Science
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
What! No GUI? -- Teaching a Text Based Command Line Oriented Introduction to Computer Science Course
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Mehta, Vedant; Lane, Charles D. – Physics Education, 2018
SenseCube is a multisensor capable of measuring many different real-time events and changes in environment. Most conventional sensors used in introductory-physics labs use their own software and have wires that must be attached to a computer or an alternate device to analyze the data. This makes the standard sensors time consuming, tedious, and…
Descriptors: Physics, Science Instruction, Teaching Methods, Laboratory Experiments
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Parlakkiliç, Alaattin – International Journal of Modern Education Studies, 2019
Today, digital transformation is changing the educational and social life rapidly. In contrast, organizations and educational institutions, developers, and end users do not benefit from cloud-based mobile technologies to the desired level. Mobile systems are used extensively for educational purposes in the Internet of Things (IoT) environment, and…
Descriptors: Computer Software, Computer Science Education, Internet, Information Technology
Tshiani, Valerie Mujinga; Tanner, Maureen – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2018
Contribution: This study contributes to scientific literature by detailing the impact of specific factors on the privacy concerns of citizens living in an African city. Findings: The findings reveal that the more that impersonal data is collected by the Smart City of Cape Town, the lower the privacy concerns of the digital natives. The findings…
Descriptors: Privacy, Foreign Countries, Information Technology, Developing Nations