Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
College Students | 3 |
Computer Security | 3 |
Confidentiality | 3 |
Computer Networks | 2 |
Internet | 2 |
Ability | 1 |
Accreditation (Institutions) | 1 |
Business Administration… | 1 |
Case Studies | 1 |
Computer Science Education | 1 |
Educational Objectives | 1 |
More ▼ |
Author
Brustoloni, Jose Carlos | 1 |
Ibrahim, Walid | 1 |
Loughry, Misty L. | 1 |
Ohland, Matthew W. | 1 |
Trabelsi, Zouheir | 1 |
Woehr, David J. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Loughry, Misty L.; Ohland, Matthew W.; Woehr, David J. – Journal of Marketing Education, 2014
Colleges of business must meet assurance of learning requirements to gain or maintain AACSB accreditation under the new standards adopted April 8, 2013. Team skills are among the most important skills desired by recruiters, yet employers and scholars perceive that team skills are frequently deficient in college graduates. This article describes…
Descriptors: Higher Education, Business Administration Education, Accreditation (Institutions), Teamwork
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments