Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Models | 2 |
| Blended Learning | 1 |
| Case Studies | 1 |
| College Seniors | 1 |
| Competence | 1 |
| Computer Science Education | 1 |
| Computer Software | 1 |
| Design Requirements | 1 |
| Education Work Relationship | 1 |
| Holistic Approach | 1 |
| More ▼ | |
Source
| ACM Transactions on Computing… | 2 |
Author
| Bendler, Daniel | 1 |
| Felderer, Michael | 1 |
| Luburic, Nikola | 1 |
| Milosavljevic, Branko | 1 |
| Sladic, Goran | 1 |
| Slivka, Jelena | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
| Information Analyses | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bendler, Daniel; Felderer, Michael – ACM Transactions on Computing Education, 2023
Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the…
Descriptors: Models, Information Security, Computer Security, Competence
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models

Peer reviewed
Direct link
