Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Computers & Education | 1 |
IEEE Transactions on Education | 1 |
Journal of Cybersecurity… | 1 |
Journal on Educational… | 1 |
Author
Abegaz, Tamirat | 1 |
Cheng, C. D. | 1 |
Jacobson, Doug | 1 |
Ko, C. C. | 1 |
Luse, Andy | 1 |
Moon, Tyler | 1 |
Payne, Bryson | 1 |
Phillips, Andrew T. | 1 |
Rursch, Julie A. | 1 |
Salimi, Abi | 1 |
Wagner, Paul J. | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Iowa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Moon, Tyler; Abegaz, Tamirat; Payne, Bryson; Salimi, Abi – Journal of Cybersecurity Education, Research and Practice, 2020
Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in a computer system. Malware disrupts the normal…
Descriptors: Information Security, Game Based Learning, Computer Security, Knowledge Level
Rursch, Julie A.; Luse, Andy; Jacobson, Doug – IEEE Transactions on Education, 2010
The IT-Adventures program is dedicated to increasing interest in and awareness of information technology among high school students using inquiry-based learning focused on three content areas: cyber defense, game design programming, and robotics. The program combines secondary, post-secondary, and industry partnerships in educational programming,…
Descriptors: Inquiry, Service Learning, Active Learning, High School Students
Wagner, Paul J.; Phillips, Andrew T. – Journal on Educational Resources in Computing, 2006
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
Descriptors: Computer Security, Workshops, Information Technology, College Faculty
Ko, C. C.; Cheng, C. D. – Computers & Education, 2008
Electronic examination systems, which include Internet-based system, require extremely complicated installation, configuration and maintenance of software as well as hardware. In this paper, we present the design and development of a flexible, easy-to-use and secure examination system (e-Test), in which any commonly used computer can be used as a…
Descriptors: Computer Assisted Testing, Computers, Program Effectiveness, Examiners