Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Science Education | 4 |
| Computer Security | 4 |
| Curriculum Implementation | 4 |
| Curriculum Development | 2 |
| Accreditation (Institutions) | 1 |
| Affordances | 1 |
| Capacity Building | 1 |
| Case Studies | 1 |
| Educational Benefits | 1 |
| Educational Innovation | 1 |
| Educational Strategies | 1 |
| More ▼ | |
Author
| Harris, Mark A. | 1 |
| Jakob E. Barnard | 1 |
| Jin Xin Matilda Ho | 1 |
| Kim Chwee Daniel Tan | 1 |
| Patten, Karen P. | 1 |
| Sherwin John San Buenaventura… | 1 |
| Tang Wee Teo | 1 |
| Xue Xian Thea Tan | 1 |
| Young, Jacob A. | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Tests/Questionnaires | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
| Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tang Wee Teo; Sherwin John San Buenaventura Mabulo; Kim Chwee Daniel Tan; Jin Xin Matilda Ho; Xue Xian Thea Tan – Journal of Science Education and Technology, 2025
STEM (science, technology, engineering, mathematics) hackathons have been conducted to offer opportunities for diverse participants to work collaboratively and intensely on tasks within a short period. However, most literature about hackathons does not offer theoretical discussions on the affordances of such learning contexts for school students.…
Descriptors: Epistemology, STEM Education, Computer Security, Programming
Jakob E. Barnard – ProQuest LLC, 2022
This project examined the adoption of cybersecurity into computing programs within liberal arts programs and whether the rate constitutes an innovative program. The research questions focused on the lived experience existing faculty members have had with the cybersecurity curriculum within liberal arts computing programs. Liberal arts general…
Descriptors: Hermeneutics, Phenomenology, Computer Security, Computer Science Education
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Harris, Mark A.; Patten, Karen P. – Journal of Information Systems Education, 2015
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Descriptors: Taxonomy, Computer Security, Curriculum Development, Undergraduate Study

Peer reviewed
Direct link
