Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Author
Abegaz, Tamirat | 1 |
Jacobson, Doug | 1 |
Lesko, Charles J., Jr. | 1 |
Luse, Andy | 1 |
Moon, Tyler | 1 |
Parrish, James L., Jr. | 1 |
Payne, Bryson | 1 |
Rursch, Julie A. | 1 |
Salimi, Abi | 1 |
Spears, Janine L. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Education Level
Elementary Secondary Education | 1 |
High Schools | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Iowa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Moon, Tyler; Abegaz, Tamirat; Payne, Bryson; Salimi, Abi – Journal of Cybersecurity Education, Research and Practice, 2020
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal…
Descriptors: Information Security, Game Based Learning, Computer Security, Knowledge Level
Lesko, Charles J., Jr. – Journal of Cybersecurity Education, Research and Practice, 2019
Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the…
Descriptors: Needs Assessment, Computer Security, Design, Computer Centers
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Rursch, Julie A.; Luse, Andy; Jacobson, Doug – IEEE Transactions on Education, 2010
The IT-Adventures program is dedicated to increasing interest in and awareness of information technology among high school students using inquiry-based learning focused on three content areas: cyber defense, game design programming, and robotics. The program combines secondary, post-secondary, and industry partnerships in educational programming,…
Descriptors: Inquiry, Service Learning, Active Learning, High School Students