Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Author
Becker, Benjamin | 1 |
Bhagyavati | 1 |
Debeer, Dries | 1 |
Hammoud, Mohammad | 1 |
He, Wu | 1 |
Lewis, Scott E. | 1 |
Molenaar, Dylan | 1 |
Payne, Brian K. | 1 |
Payne, Bryson R. | 1 |
Piety, Philip J. | 1 |
Salah, Khaled | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 9 |
Journal Articles | 7 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 9 |
Postsecondary Education | 8 |
Audience
Teachers | 1 |
Location
Maryland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Item Order and Speededness: Implications for Test Fairness in Higher Educational High-Stakes Testing
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Payne, Brian K.; He, Wu; Wang, Cong; Wittkower, D. E.; Wu, Hongyi – Journal of Information Systems Education, 2021
This paper describes an interdisciplinary effort involving faculty from five different disciplines who came together to develop an interdisciplinary, open, general education cybersecurity course. The course, Cybersecurity, Technology, and Society, brings together ideas from interdisciplinary studies, information technology, engineering, business,…
Descriptors: Computer Security, Interdisciplinary Approach, Curriculum Development, General Education
Payne, Bryson R. – Journal of Cybersecurity Education, Research and Practice, 2019
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semiautonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number…
Descriptors: Computer Security, Motor Vehicles, Information Security, Artificial Intelligence
Lewis, Scott E. – Journal of Chemical Education, 2020
This paper is designed to synopsize the efforts of a team of general chemistry teachers to enact assessments during the abrupt transition to online-only instruction and reflect on what was done successfully and what could be improved. The focus is on the extent remote, online assessments accurately measured student knowledge described within the…
Descriptors: Chemistry, Science Instruction, Online Courses, Distance Education
Piety, Philip J. – Grantee Submission, 2021
The paper discusses the use of "Productive Disciplinary Engagement" (PDE) for a curricular project that features a technology-based alternate reality game (ARG) with the objective of teaching undergraduate students about the collaborative nature of STEM careers. Much of the PDE research uses PDE as either a design-principle or as an…
Descriptors: Educational Technology, Technology Uses in Education, Undergraduate Students, Educational Games
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Business-Higher Education Forum, 2014
The Business-Higher Education Forum (BHEF) has achieved particular success in operationalizing the National Higher Education and Workforce Initiative (HEWI) in Maryland around cybersecurity. Leveraging its membership of corporate CEOs, university presidents, and government agency leaders, BHEF partnered with the University System of Maryland to…
Descriptors: Internet, Computer Security, Corporations, College Presidents
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses