Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Student Projects | 4 |
College Students | 3 |
Computer Networks | 3 |
Computer Science Education | 2 |
Internet | 2 |
Active Learning | 1 |
Business Schools | 1 |
Certification | 1 |
Competition | 1 |
Computer Science | 1 |
More ▼ |
Source
Information Systems Education… | 4 |
Author
Frydenberg, Mark | 2 |
Yates, David J. | 2 |
Babb, Jeffry S. | 1 |
Carlin, Anna | 1 |
Chen, Frankie | 1 |
Conlon, Michael P. | 1 |
Manson, Daniel P. | 1 |
McDermott, Isabelle | 1 |
Mentzer, Kevin | 1 |
Mullins, Paul | 1 |
OConnell, Jake | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Audience
Location
Massachusetts | 2 |
California | 1 |
Pennsylvania | 1 |
Rhode Island | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization