NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive8
Journal Articles6
Speeches/Meeting Papers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lesko, Charles J., Jr. – Journal of Cybersecurity Education, Research and Practice, 2019
Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the…
Descriptors: Needs Assessment, Computer Security, Design, Computer Centers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Piety, Philip J. – Grantee Submission, 2021
The paper discusses the use of "Productive Disciplinary Engagement" (PDE) for a curricular project that features a technology-based alternate reality game (ARG) with the objective of teaching undergraduate students about the collaborative nature of STEM careers. Much of the PDE research uses PDE as either a design-principle or as an…
Descriptors: Educational Technology, Technology Uses in Education, Undergraduate Students, Educational Games
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hairston, Jesse R.; Smith, Derrick W.; Williams, Tania; Sabados, William T.; Forney, Steven – Journal of Science Education for Students with Disabilities, 2020
This work showcases specific adaptations used to make cybersecurity accessible to high school students with visual impairments and blindness (VIB). The rapidly growing field of cybersecurity demands a diverse workforce; however, barriers exist which can deter students with disabilities from studying cybersecurity, let alone pursuing a career in…
Descriptors: Visual Impairments, Blindness, High School Students, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Morgan, Hani – Reading Improvement, 2015
Today an increasing number of teachers have successfully implemented blogging with students ranging from kindergarten through high school (Hungerford-Kresser, Wiggins, & Amaro-Jimenez, 2012). Although research on blogging is scant, existing studies suggest it can benefit students in various ways (Meinecke, Smith, & Lehmann-Willenbrock,…
Descriptors: Web 2.0 Technologies, Social Media, Cooperative Learning, Technology Integration
New England Board of Higher Education, 2018
Surveys of New England employers, college academic officers, and graduates find that many consider today's college graduates inadequately prepared for the world of work. In 2017, the New England Board of Higher Education convened the Commission on Higher Education & Employability, under the leadership of Rhode Island Governor Gina M. Raimondo.…
Descriptors: Education Work Relationship, Employment Potential, College Graduates, Career Readiness
Peer reviewed Peer reviewed
Direct linkDirect link
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education