Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Knowledge Level | 3 |
Computer Science | 2 |
Bachelors Degrees | 1 |
Business Schools | 1 |
Certification | 1 |
College Students | 1 |
Competence | 1 |
Computer Networks | 1 |
Computer Science Education | 1 |
Computer Security | 1 |
Computer Software | 1 |
More ▼ |
Source
Information Systems Education… | 3 |
Author
Babb, Jeffry S. | 2 |
Waguespack, Leslie J. | 2 |
Battig, Michael | 1 |
Chen, Frankie | 1 |
Frydenberg, Mark | 1 |
McDermott, Isabelle | 1 |
OConnell, Jake | 1 |
Shariq, Muhammad | 1 |
Yates, David J. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
Afghanistan | 1 |
Massachusetts | 1 |
Texas | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Waguespack, Leslie J.; Babb, Jeffry S. – Information Systems Education Journal, 2019
Amidst academic societies and agencies that accredit computing education there is a growing enthusiasm to reexamine the efficacy of the traditional model of curricular description that focused on areas of knowledge. The knowledge model informed the architecture and design of programs of teaching and learning in post-secondary, degree-granting…
Descriptors: Competence, Computer Science Education, Curriculum, Labor Force Development
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Battig, Michael; Shariq, Muhammad – Information Systems Education Journal, 2011
Using a previously published study of how students differentiate between computing disciplines, this study attempts to validate the original research and add additional hypotheses regarding the type of institution that the student resides. Using the identical survey instrument from the original study, students in smaller colleges and in different…
Descriptors: Computer Science, Intellectual Disciplines, College Students, Validity