Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
College Students | 7 |
Computer Security | 7 |
Computer Software | 3 |
Computers | 3 |
Information Security | 3 |
Information Technology | 3 |
College Faculty | 2 |
Computer Science Education | 2 |
Foreign Countries | 2 |
Global Approach | 2 |
Internet | 2 |
More ▼ |
Source
Association of Small Computer… | 1 |
Contemporary Issues in… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Journal on Educational… | 1 |
OCLC Online Computer Library… | 1 |
World Journal on Educational… | 1 |
Author
Bencheva, Nina | 1 |
Brooks, Rochelle | 1 |
Brown, Dane | 1 |
Brustoloni, Jose Carlos | 1 |
Cossey, David | 1 |
Davis, Martin H., Jr. | 1 |
Duffy, Kevin P. | 1 |
Grindei, Laura | 1 |
Grout, Ian | 1 |
Jackson, Jasmine | 1 |
Jackson, Noel | 1 |
More ▼ |
Publication Type
Reports - Evaluative | 7 |
Journal Articles | 5 |
Numerical/Quantitative Data | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Audience
Location
Canada | 1 |
Europe | 1 |
France | 1 |
Germany | 1 |
Japan | 1 |
United Kingdom | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
OConnor, T. J.; Brown, Dane; Jackson, Jasmine; Payne, Bryson; Schmeelk, Suzanna – Journal of Cybersecurity Education, Research and Practice, 2023
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to…
Descriptors: Computer Security, Computer Science Education, Gamification, Competition
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Cossey, David – Association of Small Computer Users in Education (ASCUE), 2005
Small colleges have unique challenges with respect to their information technology environments. It is easy to forget sometimes that small colleges are not simply small big colleges, and that IT needs to be considered in a particular way, especially because of its associated costs. For one thing, the senior administration at a small college may be…
Descriptors: Information Technology, Small Colleges, Telecommunications, Computers
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet