NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers3
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 30 results Save | Export
Cheryl Resch – ProQuest LLC, 2024
Software vulnerabilities in commercial products are an issue of national importance. The most prevalent breaches are input validation vulnerabilities, and these are easily avoidable. This dissertation contributes to cybersecurity education with a set of hands-on interventions tailored for three CS courses, a set of reflection prompts to encourage…
Descriptors: College Students, Computer Science Education, Computer Security, Curriculum Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
OConnor, T. J.; Brown, Dane; Jackson, Jasmine; Payne, Bryson; Schmeelk, Suzanna – Journal of Cybersecurity Education, Research and Practice, 2023
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to…
Descriptors: Computer Security, Computer Science Education, Gamification, Competition
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Peer reviewed Peer reviewed
Direct linkDirect link
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Poulsen, Seth; Herman, Geoffrey L.; Peterson, Peter A. H.; Golaszewski, Enis; Gorti, Akshita; Oliva, Linda; Scheponik, Travis; Sherman, Alan T. – ACM Transactions on Computing Education, 2022
We present a psychometric evaluation of a revised version of the "Cybersecurity Concept Inventory" ("CCI"), completed by 354 students from 29 colleges and universities. The CCI is a conceptual test of understanding created to enable research on instruction quality in cybersecurity education. This work extends previous expert…
Descriptors: Psychometrics, Computer Security, Measures (Individuals), Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Towhidi, Gelareh; Pridmore, Jeannie – Journal of Information Systems Education, 2023
Cybersecurity is among the highest in-demand skills for Information Systems graduates and therefore is critical for the Information Systems curriculum. There is a substantial lack of skilled cybersecurity graduates. It is estimated that there is a global shortage of almost three and a half million cybersecurity professionals in 2022. Organizations…
Descriptors: Computer Security, Computer Science Education, Alignment (Education), Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Kam, Hwee-Joo; Katerattanakul, Pairin – Journal of Information Technology Education: Innovations in Practice, 2019
Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to…
Descriptors: Academic Achievement, Learner Engagement, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler – Journal of Educational Computing Research, 2018
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Descriptors: Computer Security, Programming, Coding, Computer Science Education
US House of Representatives, 2018
This document records testimony from a joint meeting of the Subcommittee on Cybersecurity and Infrastructure Protection and the Subcommittee on Higher Education and Workforce Development regarding public-private solutions to educating a cyber workforce. Member statements were presented by: (1) Honorable John Ratcliffe, Chairman, Subcommittee on…
Descriptors: Labor Force Development, Computer Security, Higher Education, Hearings
Previous Page | Next Page ยป
Pages: 1  |  2