NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing 1 to 15 of 102 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ramos, Júlio Cesar; L'Erario, Alexandre; Mendonça, Marcio; Fabri, José Augusto; Palácios, Rodrigo Henrique Cunha – Education and Information Technologies, 2023
The freshman student's perspective on the activities performed in a data center by the network analyst is complex and intricate. These activities include the configuration of equipment and the connection between network devices. There are several issues with these activities that demand technical knowledge. Questions such as: "what does this…
Descriptors: Game Based Learning, College Freshmen, Computer Science Education, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
Direct linkDirect link
Barlowe, Scott – IEEE Transactions on Education, 2021
Contribution: This article demonstrates that social, cultural, economic, and political topics can be effectively addressed in the context of traditional computer science and engineering topics with few additional resources and little coordination. Background: Social, cultural, economic, and political influences are often secondary topics in…
Descriptors: Global Approach, Computer Science Education, Computer Networks, Social Influences
Peer reviewed Peer reviewed
Direct linkDirect link
Luse, Andy; Rursch, Julie – British Journal of Educational Technology, 2021
Engineering and technology educators continually strive for realistic, hands-on laboratory exercises to enhance their students' learning. This research describes the redesign of an undergraduate introductory computer networking course to include new weekly virtual laboratory assignments that culminate in a 'real world' final project of configuring…
Descriptors: Experiential Learning, Computer Science Education, Curriculum Design, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Olelewe, Chijioke Jonathan; Dong, Chunli; Abdullahim, Mohammed; Nwangwu, Chinweike Emmanuel – Technology, Pedagogy and Education, 2023
This study determined the efficacy of the video-clip lecture strategy in enhancing computer science (CS) students' performance in a computer networking course at universities in Gombe state, Nigeria. The study adopted a quasi-experimental design with non-equivalent groups of intact classes. Study participants were 136 CS third-year students made…
Descriptors: Foreign Countries, Instructional Effectiveness, Video Technology, Lecture Method
Peer reviewed Peer reviewed
Direct linkDirect link
Ciuffoletti, Augusto – IEEE Transactions on Education, 2021
Contribution: A technical course in a multidisciplinary university program has to provide high-level skills, with limited lecturing hours and student background. This article investigates the principles for its design and reports about a study case. Background: The overall course organization needs to address specific learning targets and teaching…
Descriptors: Curriculum Design, Course Organization, Computer Networks, Course Evaluation
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abdrabou, Atef; Shakhatreh, Walid – Journal of Technology and Science Education, 2021
In the era of the Internet-of-everything, learning the principles of data communications and networking is inevitable for many electrical engineering disciplines. The paper addresses the effectiveness of teaching the fundamentals of data communications and networking using a dedicated lab course as a co-requisite to a classic lecture-based course.…
Descriptors: Computer Networks, Computer Science Education, Engineering Education, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Prvan, Marina; Ožegovic, Julije – ACM Transactions on Computing Education, 2020
This article provides a survey of methods and paradigms for teaching Computer Networks (CN). Since the theoretical concepts are rather abstract in this subject, and students often find them too technical and difficult to understand, many authors attempt to answer the question on how to improve students' motivation and interest for the complex…
Descriptors: Teaching Methods, Computer Networks, Computer Science Education, Educational Research
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7