Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 4 |
| Design | 4 |
| Computer Science Education | 2 |
| Access to Information | 1 |
| Art | 1 |
| Biological Sciences | 1 |
| Biology | 1 |
| College Students | 1 |
| Computer Graphics | 1 |
| Computer Literacy | 1 |
| Computer Networks | 1 |
| More ▼ | |
Author
| Agne Brilingaite | 1 |
| Anne M. Brown | 1 |
| B. Bagby | 1 |
| Eric K. Kaufman | 1 |
| Evita Roponena | 1 |
| Farkas, Robert | 1 |
| Feras A. Batarseh | 1 |
| Heather Lindberg | 1 |
| Janis Grabis | 1 |
| Karen Parish | 1 |
| Krunic, Tanja | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 4 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| Maryland (Baltimore) | 1 |
| Serbia | 1 |
| Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Samson O. Adeoye; Heather Lindberg; B. Bagby; Anne M. Brown; Feras A. Batarseh; Eric K. Kaufman – NACTA Journal, 2023
Cyberbiosecurity is an emerging field at the convergence of life sciences and the digital world. As technological advances improve operational processes and expose them to vulnerabilities in agriculture and life sciences, cyberbiosecurity has become increasingly important for addressing contemporary concerns. Unfortunately, at this time,…
Descriptors: Computer Security, Biology, Biological Sciences, Labor Force Development
Ruta Pirta-Dreimane; Agne Brilingaite; Evita Roponena; Karen Parish; Janis Grabis; Ricardo Gregorio Lugo; Martinš Bonders – Technology, Knowledge and Learning, 2025
Incorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk…
Descriptors: Computer Security, Computer Science Education, Educational Games, Gamification
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Krunic, Tanja; Ruzic-Dimitrijevic, Ljiljana; Petrovic, Branka; Farkas, Robert – Journal of Information Technology Education, 2006
The Advanced Technical School from Novi Sad set up a completely new study group for web design in 2004. The main goals of the paper are to explain the steps that were taken in starting this group, and to present the educational program based on our own research through the organization of the group and course descriptions. Since there is a…
Descriptors: Investigations, Prior Learning, Course Descriptions, Internet

Peer reviewed
Direct link
