Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 22 |
Descriptor
Source
Author
Publication Type
Reports - Descriptive | 43 |
Journal Articles | 35 |
Speeches/Meeting Papers | 5 |
Numerical/Quantitative Data | 2 |
Tests/Questionnaires | 2 |
Books | 1 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 23 |
Postsecondary Education | 19 |
Two Year Colleges | 1 |
Audience
Practitioners | 3 |
Administrators | 2 |
Teachers | 1 |
Location
California | 3 |
Ohio | 3 |
Australia | 2 |
Florida | 2 |
Indiana | 2 |
United States | 2 |
Virginia | 2 |
Arkansas | 1 |
Austria (Vienna) | 1 |
Hawaii | 1 |
Lithuania | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Teresa Swist; Thilakshi Mallawa Arachchi; Jenna Condie; Benjamin Hanckel – Learning, Media and Technology, 2024
The COVID-19 pandemic sparked an unprecedented expansion of educational technologies and digitisation of the university sector, and also amplified existing inequalities and crises. In this paper, we introduce the 'socio-technically just pedagogies framework' to systemically explore curriculum-making, student-staff partnerships, knowledge…
Descriptors: Foreign Countries, College Students, College Faculty, Teacher Student Relationship
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Etherington, Thomas R. – Journal of Geography in Higher Education, 2016
Computer programming is not commonly taught to geographers as a part of geographic information system (GIS) courses, but the advent of NeoGeography, big data and open GIS means that programming skills are becoming more important. To encourage the teaching of programming to geographers, this paper outlines a course based around a series of…
Descriptors: Programming, Geographic Information Systems, Geography Instruction, Introductory Courses
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Rabkin, Ariel; Reiss, Charles; Katz, Randy; Patterson, David – ACM Transactions on Computing Education, 2013
We describe our experiences teaching MapReduce in a large undergraduate lecture course using public cloud services and the standard Hadoop API. Using the standard API, students directly experienced the quality of industrial big-data tools. Using the cloud, every student could carry out scalability benchmarking assignments on realistic hardware,…
Descriptors: Assignments, Undergraduate Study, Computer Networks, Educational Technology
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Rienzo, Thomas F.; Athappilly, Kuriakose K. – Decision Sciences Journal of Innovative Education, 2012
Business students taking data mining classes are often introduced to artificial neural networks (ANN) through point and click navigation exercises in application software. Even if correct outcomes are obtained, students frequently do not obtain a thorough understanding of ANN processes. This spreadsheet model was created to illuminate the roles of…
Descriptors: Spreadsheets, Artificial Intelligence, Teaching Methods, Educational Practices
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Miseviciene, Regina; Ambraziene, Danute; Tuminauskas, Raimundas; Pažereckas, Nerijus – Informatics in Education, 2012
Many factors influence education nowadays. Educational institutions are faced with budget cuttings, outdated IT, data security management and the willingness to integrate remote learning at home. Virtualization technologies provide innovative solutions to the problems. The paper presents an original educational infrastructure using virtualization…
Descriptors: Computer Simulation, Universities, College Students, College Faculty
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
Smith, Marissa L.; Cline, Mark A. – Journal of Science Education and Technology, 2011
Radford University was recently configured with a campus-wide wireless local area network. Using these new capabilities, a classroom-based Honors section of Concepts of Biology was conducted solely using electronic technologies (paper was never transferred from professor to student). To accomplish this, students used common software and freeware.…
Descriptors: Biology, Instructional Effectiveness, Computer Software, Educational Technology