Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
College Students | 6 |
Computer Security | 6 |
Instructional Effectiveness | 6 |
Computer Science Education | 5 |
College Instruction | 3 |
Computer Software | 3 |
Internet | 3 |
Teaching Methods | 3 |
Active Learning | 2 |
Business Administration… | 2 |
Case Studies | 2 |
More ▼ |
Source
Journal of Information… | 2 |
Educational Technology &… | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
Journal of Instructional… | 1 |
Author
Chen, Li-Chiou | 1 |
Davis, Martin H., Jr. | 1 |
Duffy, Kevin P. | 1 |
Frydenberg, Mark | 1 |
Mentzer, Kevin | 1 |
Pendegraft, Norman | 1 |
Saleh, Mohamad | 1 |
Sethi, Vikram | 1 |
Tao, Lixin | 1 |
Yates, David J. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Elementary Secondary Education | 1 |
Audience
Teachers | 3 |
Location
Arizona (Phoenix) | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Saleh, Mohamad – Journal of Instructional Research, 2020
Having a clear teaching strategy is vital when it comes to improving students' retention and preserving their knowledge. Various general teaching approaches have been incorporated into the classrooms as ways of improving teaching and student learning. Some of these approaches proved to be effective and some are ineffective. In this study, I…
Descriptors: Teaching Methods, Computer Security, Instructional Effectiveness, STEM Education
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers