Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
ACM Transactions on Computing… | 3 |
Author
Archer, Ricky | 1 |
Cutts, Quintin | 1 |
Kaza, Siddharth | 1 |
Qadah, Yaseen | 1 |
Renaud, Karen | 1 |
Taylor, Blair | 1 |
Vega, Percy | 1 |
Xu, Jinsheng | 1 |
Yu, Huiming | 1 |
Yuan, Xiaohong | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
Maryland | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study