Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Security | 4 |
| Student Projects | 4 |
| College Students | 3 |
| Computer Networks | 3 |
| Computer Science Education | 2 |
| Internet | 2 |
| Active Learning | 1 |
| Business Schools | 1 |
| Certification | 1 |
| Competition | 1 |
| Computer Science | 1 |
| More ▼ | |
Source
| Information Systems Education… | 4 |
Author
| Frydenberg, Mark | 2 |
| Yates, David J. | 2 |
| Babb, Jeffry S. | 1 |
| Carlin, Anna | 1 |
| Chen, Frankie | 1 |
| Conlon, Michael P. | 1 |
| Manson, Daniel P. | 1 |
| McDermott, Isabelle | 1 |
| Mentzer, Kevin | 1 |
| Mullins, Paul | 1 |
| OConnell, Jake | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 2 |
| Reports - Research | 2 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 4 |
Audience
Location
| Massachusetts | 2 |
| California | 1 |
| Pennsylvania | 1 |
| Rhode Island | 1 |
| Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization

Peer reviewed
