Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 26 |
Descriptor
College Students | 27 |
Computer Security | 27 |
Computer Networks | 20 |
Information Technology | 12 |
Internet | 12 |
Foreign Countries | 9 |
Computer Science Education | 8 |
Computer Software | 8 |
Educational Technology | 8 |
Social Networks | 8 |
College Faculty | 7 |
More ▼ |
Source
Author
Smith, Peter, Ed. | 3 |
Hawkins, Brian L. | 2 |
Rudy, Julia A. | 2 |
Ambraziene, Danute | 1 |
Annessi, Robert | 1 |
Ashford, Tina | 1 |
Bernhardt, Valentin | 1 |
Brustoloni, Jose Carlos | 1 |
Carlin, Anna | 1 |
Conlon, Michael P. | 1 |
Debiec, Piotr | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 24 |
Postsecondary Education | 18 |
Elementary Secondary Education | 2 |
High Schools | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Two Year Colleges | 1 |
Audience
Media Staff | 1 |
Teachers | 1 |
Location
Germany | 3 |
Ohio | 3 |
United States | 3 |
California | 2 |
Florida | 2 |
Israel | 2 |
Italy | 2 |
Japan | 2 |
Pennsylvania | 2 |
United Kingdom | 2 |
Asia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hari Prasad Challa – ProQuest LLC, 2024
The increasing complexity of modern power systems, coupled with the integration of diverse rapidly evolving technologies involving physical systems requiring cybersecurity, has presented significant challenges for engineers in the field and researchers in laboratory facilities. This research and dissertation presents the development of a…
Descriptors: Computer Security, Information Systems, Technology Integration, Information Technology
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Wang, Jianjun – Grantee Submission, 2014
"Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…
Descriptors: Information Technology, Computer Networks, Curriculum Development, Undergraduate Students
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Miseviciene, Regina; Ambraziene, Danute; Tuminauskas, Raimundas; Pažereckas, Nerijus – Informatics in Education, 2012
Many factors influence education nowadays. Educational institutions are faced with budget cuttings, outdated IT, data security management and the willingness to integrate remote learning at home. Virtualization technologies provide innovative solutions to the problems. The paper presents an original educational infrastructure using virtualization…
Descriptors: Computer Simulation, Universities, College Students, College Faculty
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
Young, Jeffrey R. – Education Digest: Essential Readings Condensed for Quick Review, 2009
In this article, the author presents the top-10 list of campus computer-security risks he compiled based on several recent computing surveys and interviews with more than a dozen college-technology leaders. The list, ordered from least to most serious, is by no means scientific, but it gives a sense of where today's battle lines are--and why…
Descriptors: Computer Security, Computers, Social Networks, Evaluation Methods
Flinn, Michael Bradley – ProQuest LLC, 2009
With privacy concerns growing on a daily basis, it is important to understand how college students guard their personally identifiable information. Despite the students' perceived readiness and several studies on the topic, it is not fully understood what personally identifiable information college students are sharing via online social networks…
Descriptors: College Students, Internet, Social Networks, Grade Point Average
Shelton, Kay – Community & Junior College Libraries, 2009
The media often report on the negativity of Facebook, with horror stories of people losing their jobs because of something they posted. There can be useful purposes for Facebook, however, especially after the unthinkable happens on a college campus. Community college libraries can incorporate Facebook into their security planning.
Descriptors: Community Colleges, College Libraries, Social Networks, Computer Mediated Communication
Previous Page | Next Page »
Pages: 1 | 2