Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Science Education | 4 |
Computer Security | 4 |
Course Evaluation | 4 |
College Students | 2 |
Computer Networks | 2 |
Computer Software | 2 |
Information Security | 2 |
Student Attitudes | 2 |
Undergraduate Students | 2 |
Alignment (Education) | 1 |
Business | 1 |
More ▼ |
Source
Advances in Engineering… | 1 |
Educational Technology &… | 1 |
IEEE Transactions on Learning… | 1 |
Journal of Information… | 1 |
Author
Bhunia, Swarup | 1 |
Chen, Li-Chiou | 1 |
Hammoud, Mohammad | 1 |
Paul, Shubhra Deb | 1 |
Pridmore, Jeannie | 1 |
Salah, Khaled | 1 |
Tao, Lixin | 1 |
Towhidi, Gelareh | 1 |
Yang, Shuo | 1 |
Zeadally, Sherali | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Audience
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Towhidi, Gelareh; Pridmore, Jeannie – Journal of Information Systems Education, 2023
Cybersecurity is among the highest in-demand skills for Information Systems graduates and therefore is critical for the Information Systems curriculum. There is a substantial lack of skilled cybersecurity graduates. It is estimated that there is a global shortage of almost three and a half million cybersecurity professionals in 2022. Organizations…
Descriptors: Computer Security, Computer Science Education, Alignment (Education), Higher Education
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education