Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 6 |
Computer Oriented Programs | 6 |
Computer Security | 6 |
Information Technology | 5 |
Artificial Intelligence | 2 |
Higher Education | 2 |
Information Storage | 2 |
Internet | 2 |
Access to Information | 1 |
Assignments | 1 |
College Administration | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 2 |
Association Supporting… | 1 |
CAUSE/EFFECT | 1 |
Education and Information… | 1 |
Educational Technology | 1 |
Author
Ashford, Tina | 1 |
Bernbom, Gerald | 1 |
Brady D. Lund | 1 |
Bui Thanh Hung | 1 |
Galbreath, Jeremy, Ed. | 1 |
Gayatri Parasa | 1 |
Lidong Wang | 1 |
Prasun Chakrabarti | 1 |
Rogers, Gary | 1 |
S. Siva Shankar | 1 |
Tulika Chakrabarti | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Florida | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Bernbom, Gerald; And Others – CAUSE/EFFECT, 1994
Faced with the challenge of providing security across a complex, multiprotocol institutional information network, computing services at Indiana University implemented a responsive, collaborative security architecture designed for the future. Information systems design, security principles and strategy, and implementation are described. (Author/MSE)
Descriptors: Access to Information, College Administration, Computer Networks, Computer Oriented Programs
Galbreath, Jeremy, Ed. – Educational Technology, 1997
Examines the "reality behind the hype" surrounding the Internet. Discusses its early development; growth and present state; and key applications, including e-mail, voice/video telephony, integrated messaging, electronic commerce, the World Wide Web, and Web commerce, Intranet, Extranet; education and training; security; ownership; and…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Oriented Programs, Computer Security