Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 2 |
Curriculum Development | 2 |
College Instruction | 1 |
College Students | 1 |
Computer System Design | 1 |
Crime | 1 |
Employees | 1 |
Evidence | 1 |
Feedback (Response) | 1 |
Hospitals | 1 |
Information Security | 1 |
More ▼ |
Source
Journal on Educational… | 2 |
Author
Bangert-Drowns, Robert | 1 |
Baykal, Adnan | 1 |
Berg, George | 1 |
Bloniarz, Peter | 1 |
Delio, Vince | 1 |
Gangolly, Jagdish | 1 |
Goel, Sanjay | 1 |
Harrison, Warren | 1 |
Hobbs, Jon | 1 |
Hurbanek, Thomas | 1 |
Iwan, Laura | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Harrison, Warren – Journal on Educational Resources in Computing, 2006
The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…
Descriptors: Computer Security, Computer System Design, Evidence, Crime
Goel, Sanjay; Pon, Damira; Bloniarz, Peter; Bangert-Drowns, Robert; Berg, George; Delio, Vince; Iwan, Laura; Hurbanek, Thomas; Schuman, Sandoor P.; Gangolly, Jagdish; Baykal, Adnan; Hobbs, Jon – Journal on Educational Resources in Computing, 2006
A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted…
Descriptors: Feedback (Response), Curriculum Development, Hospitals, Computer Security