Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Author
Abu-Taieh, Evon M. | 1 |
Alluhaidan, Ala | 1 |
Blair Taylor | 1 |
Jeff Hanson | 1 |
Lukowiak, Marcin | 1 |
Radziszowski, Stanislaw | 1 |
Siddharth Kaza | 1 |
Vallino, James | 1 |
Wood, Christopher | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Tests/Questionnaires | 3 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Alluhaidan, Ala; Abu-Taieh, Evon M. – International Education Studies, 2020
Abstract The rapid growth of technology and related fields has led to creation in academia to match the expansion demand for IT professionals. One of the current majors that attract attention in industry is cybersecurity. There is a great need for individuals who are skilled in cybersecurity to protect IT infrastructure. Coaching a…
Descriptors: Outcomes of Education, Computer Security, Information Technology, Computer Science Education
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education