Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Science Education | 3 |
Computer Security | 3 |
Course Descriptions | 3 |
Computer Networks | 2 |
Course Content | 2 |
Information Security | 2 |
Best Practices | 1 |
Computer Peripherals | 1 |
Computer Software | 1 |
Computer Uses in Education | 1 |
Conflict | 1 |
More ▼ |
Author
Astrom, Peik | 1 |
Bergstrom, Laura | 1 |
Bhunia, Swarup | 1 |
Grahn, Kaj J. | 1 |
Herr, Trey | 1 |
Karlstrom, Krister | 1 |
Laudrain, Arthur P. B. | 1 |
Paul, Shubhra Deb | 1 |
Pulkkis, Goran | 1 |
Smeets, Max | 1 |
Yang, Shuo | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Herr, Trey; Laudrain, Arthur P. B.; Smeets, Max – Journal of Political Science Education, 2021
Colleges and universities continue to expand their curricula to include cybersecurity as an explicit course of study in political science. But what is taught in a course on cybersecurity? Are syllabi deep dives into technology, broad romps through contemporary policy debates, or do they reflect a more varied disposition? Studying the syllabi of an…
Descriptors: Computer Science Education, Computer Security, Information Security, Political Science
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks