Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Source
Association of Small Computer… | 1 |
Education and Information… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Author
Astrom, Peik | 1 |
Belshaw, Scott H. | 1 |
Bergstrom, Laura | 1 |
Colaiuta, Alexandrea | 1 |
Dunn, Deborah | 1 |
Grahn, Kaj J. | 1 |
Jun-Ming Su | 1 |
Karlstrom, Krister | 1 |
Nodeland, Brooke | 1 |
Pulkkis, Goran | 1 |
Underwood, Lorrin | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 4 |
Journal Articles | 3 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Dunn, Deborah – Association of Small Computer Users in Education (ASCUE), 2005
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
Descriptors: Databases, Information Technology, Computer Security, Computer Literacy
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks