Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 4 |
Computer Security | 4 |
Undergraduate Study | 4 |
Computer Science Education | 3 |
Crime Prevention | 2 |
Information Security | 2 |
Information Technology | 2 |
Internet | 2 |
Accountability | 1 |
Animation | 1 |
Certification | 1 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Grantee Submission | 1 |
International Journal of… | 1 |
Journal of Information… | 1 |
Author
Archer, Ricky | 1 |
Li, Chengcheng | 1 |
Qadah, Yaseen | 1 |
Vega, Percy | 1 |
Wang, Hai | 1 |
Wang, Jianjun | 1 |
Wang, Shouhong | 1 |
Xu, Jinsheng | 1 |
Yu, Huiming | 1 |
Yuan, Xiaohong | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
California | 1 |
North Carolina | 1 |
Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study