NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Peer reviewed Peer reviewed
Direct linkDirect link
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Poulsen, Seth; Herman, Geoffrey L.; Peterson, Peter A. H.; Golaszewski, Enis; Gorti, Akshita; Oliva, Linda; Scheponik, Travis; Sherman, Alan T. – ACM Transactions on Computing Education, 2022
We present a psychometric evaluation of a revised version of the "Cybersecurity Concept Inventory" ("CCI"), completed by 354 students from 29 colleges and universities. The CCI is a conceptual test of understanding created to enable research on instruction quality in cybersecurity education. This work extends previous expert…
Descriptors: Psychometrics, Computer Security, Measures (Individuals), Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alluhaidan, Ala; Abu-Taieh, Evon M. – International Education Studies, 2020
Abstract The rapid growth of technology and related fields has led to creation in academia to match the expansion demand for IT professionals. One of the current majors that attract attention in industry is cybersecurity. There is a great need for individuals who are skilled in cybersecurity to protect IT infrastructure. Coaching a…
Descriptors: Outcomes of Education, Computer Security, Information Technology, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Goertler, Senta; Gacs, Adam – Unterrichtspraxis/Teaching German, 2018
As online educational programs and courses increase (Allen & Seaman, [Allen, I. E., 2014]), it is important to understand the benefits and limitations of this delivery format when assessing students and when comparing learning outcomes. This article addresses the following two questions: (1) What are some of the best practices in assessing…
Descriptors: Online Courses, Second Language Instruction, Second Language Learning, German
Peer reviewed Peer reviewed
Direct linkDirect link
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Neville, Karen; Heavin, Ciara – Electronic Journal of e-Learning, 2013
The emergence of social media has forced educators to think differently about the way learning occurs. Students and practitioners alike are using new technologies to connect with peers/colleagues, share ideas, resources and experiences for extracurricular activities. The social business gaming platform considered in this study leverages the social…
Descriptors: Foreign Countries, Social Networks, Internet, Computer Security