NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Yoshida, R.; Page, R. – PRIMUS, 2022
In the fall of 2009 and in the spring of 2012, supported by the National Institute of General Medical Sciences (NIGMS) in the National Institutes of Health (NIH), we designed a course "Phylogenetic Analysis and Molecular Evolution" (PAME), the first cross-listed course across three different colleges (College of Arts and Sciences,…
Descriptors: Molecular Biology, Evolution, Molecular Structure, Graduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Clark, Ulku; Stoker, Geoff; Vetter, Ron – Information Systems Education Journal, 2020
The rising number and cost of cybersecurity attacks justifies continued strong interest in the National Security Agency (NSA) and Department of Homeland Security (DHS) jointly sponsored program for National Centers of Academic Excellence in Cyber Defense (CAE-CD). After briefly outlining the current state of the cybersecurity challenge, this…
Descriptors: Educational Change, Information Security, Public Agencies, National Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tsado, Lucy – Journal of Cybersecurity Education, Research and Practice, 2019
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not…
Descriptors: Information Security, National Security, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Peer reviewed Peer reviewed
Direct linkDirect link
Al-Khasawneh, Ahmad; Hammad, Bashar K. – Education for Information, 2013
Service learning methodologies provide information systems students with the opportunity to create and implement systems in real-world, public service-oriented social contexts. This paper presents a case study of integrating a service learning project into an undergraduate Computer Information Systems course titled "Information Systems"…
Descriptors: Foreign Countries, Service Learning, Civics, Citizen Participation
Peer reviewed Peer reviewed
Direct linkDirect link
Irwin, Gretchen; Wessel, Lark; Blackman, Harvey – Journal of Information Systems Education, 2012
This case describes a database redesign project for the United States Department of Agriculture's National Animal Germplasm Program (NAGP). The case provides a valuable context for teaching and practicing database analysis, design, and implementation skills, and can be used as the basis for a semester-long team project. The case demonstrates the…
Descriptors: Course Descriptions, Genetics, Animals, Animal Husbandry
Peer reviewed Peer reviewed
Direct linkDirect link
Liao, Chao-ning; Chiang, LiChun – Educational Technology & Society, 2008
To help the civil servants in both central and local governments in Taiwan operating administrative works smoothly under a new digitalized system launched in 1994, a series of courses related to information technology were offered free to them annually by the central governments. However, due to the budget deficit in recent years, the government…
Descriptors: Information Technology, Foreign Countries, City Government, Public Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Prichard, Janet J.; MacDonald, Laurie E. – Journal of Information Technology Education, 2004
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
Descriptors: Terrorism, Textbooks, Computer Security, Public Agencies
Wasley, Paula – Chronicle of Higher Education, 2008
This article talks about a software designed by the University of Phoenix for its business, information-technology, education, and health-care courses. Through the university's "virtual organizations"--online teaching tools designed to simulate the experience of working at a typical corporation, school, or government agency, Phoenix students can…
Descriptors: Feedback (Response), World Problems, Employees, Distance Education