Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Science Education | 4 |
Computer Security | 4 |
Evaluation Methods | 4 |
Information Technology | 3 |
Case Studies | 2 |
College Instruction | 2 |
Computer Software | 2 |
Foreign Countries | 2 |
Inquiry | 2 |
Instructional Design | 2 |
Instructional Effectiveness | 2 |
More ▼ |
Source
Information Systems Education… | 1 |
Interactive Technology and… | 1 |
International Association for… | 1 |
International Education… | 1 |
Author
Abu-Taieh, Evon M. | 1 |
Alluhaidan, Ala | 1 |
Brown, Brandon | 1 |
Campbell, Jackie | 1 |
Pike, Ronald E. | 1 |
West, Tobi | 1 |
Zentner, Aeron | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
United Kingdom | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
California | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Pike, Ronald E.; Brown, Brandon; West, Tobi; Zentner, Aeron – Information Systems Education Journal, 2020
The aim of this report is to highlight efforts to develop a digital badging and e-portfolio environment that will illuminate and validate curricular, co-curricular, and extracurricular learning in cybersecurity. This effort includes Cal Poly Pomona and Coastline College, which are both designated as Centers of Academic Excellence in Cyber Defense…
Descriptors: Recognition (Achievement), Evaluation Methods, Portfolios (Background Materials), Computer Security
Alluhaidan, Ala; Abu-Taieh, Evon M. – International Education Studies, 2020
Abstract The rapid growth of technology and related fields has led to creation in academia to match the expansion demand for IT professionals. One of the current majors that attract attention in industry is cybersecurity. There is a great need for individuals who are skilled in cybersecurity to protect IT infrastructure. Coaching a…
Descriptors: Outcomes of Education, Computer Security, Information Technology, Computer Science Education
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers