Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Science Education | 7 |
Computer Security | 7 |
Guidelines | 7 |
Curriculum Development | 4 |
Information Security | 4 |
Teaching Methods | 3 |
Computer Software | 2 |
Educational Benefits | 2 |
Educational Objectives | 2 |
Information Systems | 2 |
Job Skills | 2 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
European Journal of Education | 1 |
Higher Education, Skills and… | 1 |
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Educational… | 1 |
Journal of Information… | 1 |
Author
Abdel-Karim Al-Tamimi | 1 |
Alhamdani, Wasim A. | 1 |
Bohler, Jeffrey A. | 1 |
Kalle Grill | 1 |
Karin Danielsson | 1 |
Khalid Samara | 1 |
Ladwig, Christine | 1 |
Larson, Benjamin | 1 |
Lena Enqvist | 1 |
Loïs Vanhée | 1 |
Maher Salem | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 4 |
Reports - Research | 3 |
Education Level
Postsecondary Education | 4 |
Higher Education | 3 |
Audience
Practitioners | 1 |
Location
Netherlands | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Bohler, Jeffrey A.; Larson, Benjamin; Peachey, Todd A.; Shehane, Ronald F. – Journal of Information Systems Education, 2020
Information systems education objectives must continually adapt to a dynamic marketplace for knowledge and skills. For faculty developing programs that better prepare students for this demanding environment, existing research and guidelines provide a foundation to develop relevant coursework. However, an examination of peer institutions indicates…
Descriptors: Information Systems, Computer Science Education, Curriculum Evaluation, Guidelines
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Straub, Jeremy – Journal of Educational Technology Systems, 2014
The development of software for spacecraft represents a particular challenge and is, in many ways, a worst case scenario from a design perspective. Spacecraft software must be "bulletproof" and operate for extended periods of time without user intervention. If the software fails, it cannot be manually serviced. Software failure may…
Descriptors: Comparative Analysis, Computer Software, Computer Science Education, Educational Technology