Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
CEDEFOP Flash | 1 |
Information Systems Education… | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Educational… | 1 |
Author
Babb, Jeffry S. | 1 |
Chen, Frankie | 1 |
Crowcroft, Jon | 1 |
Frydenberg, Mark | 1 |
Goulden, Murray | 1 |
Greiffenhagen, Christian | 1 |
Lidong Wang | 1 |
Mayrath, Michael | 1 |
McAuley, Derek | 1 |
McDermott, Isabelle | 1 |
Mortier, Richard | 1 |
More ▼ |
Publication Type
Reports - Research | 5 |
Journal Articles | 4 |
Collected Works - Serials | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Goulden, Murray; Greiffenhagen, Christian; Crowcroft, Jon; McAuley, Derek; Mortier, Richard; Radenkovic, Milena; Sathiaseelan, Arjuna – International Journal of Social Research Methodology, 2017
Drawing on the experiences of a novel collaborative project between sociologists and computer scientists, this paper identifies a set of challenges for fieldwork that are generated by this "wild interdisciplinarity. Public Access Wi-Fi Service" was a project funded by an 'in-the-wild' research programme, involving the study of digital…
Descriptors: Ethnography, Computer Science, Interdisciplinary Approach, Sociology
Nihalani, Priya K.; Mayrath, Michael; Robinson, Daniel H. – Journal of Educational Psychology, 2011
We investigated the effects of feedback and collaboration on undergraduates' transfer performance when using a computer networking training simulation. In Experiment 1, 65 computer science "novices" worked through an instructional protocol individually (control), individually with feedback, or collaboratively with feedback. Unexpectedly,…
Descriptors: Expertise, Feedback (Response), Computer Simulation, Prior Learning
CEDEFOP Flash, 1994
A 1993 study compared trends in the structure of qualifications for occupations related to the installation, management, and maintenance of computer networks in Germany, France, Italy, the Netherlands, Portugal, and the United Kingdom. Staff involved in networks required specialized new skills related to feasibility and design, installation,…
Descriptors: Adult Education, Computer Networks, Computer Science, Computer Science Education