Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Science Education | 4 |
Computer Security | 4 |
Guidelines | 4 |
Information Security | 4 |
Curriculum Development | 3 |
Models | 2 |
Barriers | 1 |
Case Studies | 1 |
Competency Based Education | 1 |
Computer Mediated… | 1 |
Computer Software | 1 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Higher Education, Skills and… | 1 |
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Author
Abdel-Karim Al-Tamimi | 1 |
Alhamdani, Wasim A. | 1 |
Khalid Samara | 1 |
Ladwig, Christine | 1 |
Maher Salem | 1 |
Schwieger, Dana | 1 |
Spruit, Marcel | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Education Level
Postsecondary Education | 3 |
Higher Education | 2 |
Audience
Location
Netherlands | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy