Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 6 |
| Since 2007 (last 20 years) | 9 |
Descriptor
Source
Author
| Frydenberg, Mark | 2 |
| Yates, David J. | 2 |
| Babb, Jeffry S. | 1 |
| Bhuyan, Jay | 1 |
| Burkman, Jim | 1 |
| Campbell, Jackie | 1 |
| Chen, Frankie | 1 |
| Frontera, Paul J. | 1 |
| Hur, Jung Won | 1 |
| Koong, Kai | 1 |
| Lukowiak, Marcin | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 9 |
| Journal Articles | 8 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 6 |
| Postsecondary Education | 6 |
| High Schools | 2 |
| Secondary Education | 2 |
| Elementary Secondary Education | 1 |
| Grade 10 | 1 |
| Grade 11 | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Frontera, Paul J.; Rodriguez-Seda, Erick J. – IEEE Transactions on Education, 2021
Contribution: This article presents a project-based learning (PBL) activity for use in the instruction of network attacks on cyber-physical systems. Student learning is analyzed to determine the project's contribution to learning outcome attainment. Background: The literature contains a significant amount of research on the benefits of PBL as a…
Descriptors: Student Projects, Teaching Methods, Computer Security, Information Security
Luse, Andy; Burkman, Jim – Journal of Cybersecurity Education, Research and Practice, 2021
Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner,…
Descriptors: Computer Security, Information Security, Deception, Student Projects
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Martin, Jason – Journal of Science Education for Students with Disabilities, 2019
The scope of this article is to describe the creation and implementation of specialized adaptations used in teaching the subject of basic cryptography to students who are visually impaired or blind. Included is an overview of events held for visually impaired and blind transition age youth in Alabama and the methods used to engage this population…
Descriptors: Braille, Large Type Materials, Assistive Technology, Students with Disabilities
Bhuyan, Jay; Wu, Fan; Thomas, Cassandra; Koong, Kai; Hur, Jung Won; Wang, Chih-hsuan – TechTrends: Linking Research and Practice to Improve Learning, 2020
This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the…
Descriptors: Teaching Methods, Grade 10, Grade 11, High School Students
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning

Peer reviewed
Direct link
