Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 7 |
Descriptor
Source
Author
Archer, Ricky | 1 |
Du, Wenliang | 1 |
Dunn, Deborah | 1 |
Imboden, Thomas | 1 |
Johnson, Clare | 1 |
Li, Chengcheng | 1 |
Martin, Nancy L. | 1 |
Peslak, Alan R. | 1 |
Qadah, Yaseen | 1 |
Ulrich A. Hoensch | 1 |
Vega, Percy | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 8 |
Journal Articles | 7 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 6 |
Audience
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Johnson, Clare – Higher Education Pedagogies, 2019
Higher Education institutions understand that there is a need to embed professional skills within degree programmes. However, evidence shows that graduates, whilst having developed good theoretical knowledge, lack experience and confidence when entering the workplace. Employers view the importance of degree-related skills as only a part of the…
Descriptors: Foreign Countries, Computer Security, Student Projects, Active Learning
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Du, Wenliang; Wang, Ronghua – Journal on Educational Resources in Computing, 2008
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
Descriptors: Computer Security, Laboratories, Computers, Computer Science
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Dunn, Deborah – Association of Small Computer Users in Education (ASCUE), 2005
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
Descriptors: Databases, Information Technology, Computer Security, Computer Literacy