Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Author
Astrom, Peik | 1 |
Belshaw, Scott H. | 1 |
Bergstrom, Laura | 1 |
Colaiuta, Alexandrea | 1 |
Grahn, Kaj J. | 1 |
Guynes, Carl S. | 1 |
Jensen, Bradley K. | 1 |
Karlstrom, Krister | 1 |
Nodeland, Brooke | 1 |
Nyaboga, Andrew | 1 |
Pulkkis, Goran | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks