NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Birgy Lorenz – Educational Media International, 2023
The proportion of women in the IT sector is decreasing. In schools, girls tend to stay away from IT or take on roles in softer activities such as digital safety, social media. Studying and working in IT requires technical skillset. At the same time, the sector would need people with people and organizational skills as well. Technical skills can be…
Descriptors: Females, Role Models, Information Technology, Foreign Countries
Jenness, Sarah; Acheampong, Zoe – Jobs for the Future, 2022
This resource provides helpful information for high school teachers and counselors to better understand computer science, an industry that has many high-wage jobs open across the country. The resource supports effective advising by including an overview of computer science, cybersecurity, and networking; defines in-demand computer science skills…
Descriptors: High School Teachers, Counselors, Computer Science, Academic Advising
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Kashiri, Erica; Troyan, Danielle – Industry and Higher Education, 2014
Partnerships between higher education and business have long been an important part of the academic landscape, but often they are based on shorter-term transactional objectives rather than on longer-term strategic goals. BHEF's National Higher Education and Workforce Initiative brings together business and academia at the institutional,…
Descriptors: School Business Relationship, Partnerships in Education, Computer Security, STEM Education
Pan, Xunyu – ProQuest LLC, 2011
With the rapid growth of the Internet and the popularity of digital imaging devices, digital imagery has become our major information source. Meanwhile, the development of digital manipulation techniques employed by most image editing software brings new challenges to the credibility of photographic images as the definite records of events. We…
Descriptors: Photography, Information Technology, Credibility, Crime
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Parakh, Abhishek – ProQuest LLC, 2011
Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…
Descriptors: Computers, Information Storage, Information Dissemination, Mathematics
Peer reviewed Peer reviewed
Direct linkDirect link
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology