Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Science Education | 5 |
Computer Security | 5 |
Learning Experience | 5 |
Student Attitudes | 4 |
Undergraduate Students | 4 |
Information Security | 3 |
Learner Engagement | 3 |
Artificial Intelligence | 2 |
Career Readiness | 2 |
College Faculty | 2 |
Computer Networks | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Advances in Engineering… | 1 |
Education and Information… | 1 |
International Association for… | 1 |
Author
Adil Jeghal | 1 |
Ali Yahyaouy | 1 |
Bhunia, Swarup | 1 |
Emmanuel Wansi | 1 |
Hajar Majjate | 1 |
Hamid Tairi | 1 |
Khalid Alaoui Zidani | 1 |
Paul, Shubhra Deb | 1 |
Rice, Jeffrey Philip | 1 |
Yang, Shuo | 1 |
Youssra Bellarhmouch | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Location
Florida | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
Emmanuel Wansi – ProQuest LLC, 2023
Shortages within the cybersecurity workforce are not new; fluctuations in supply and demand, fiscal and monetary constraints, and technological advances have influenced changes within the cybersecurity workforce nationally and globally. Cloud computing and the Internet of Things (IoT) impact many different cybersecurity roles within different…
Descriptors: Evaluation, Internet, Computer Security, Information Security
Rice, Jeffrey Philip – ProQuest LLC, 2021
Using the lived experiences of study participants, the purpose of the exploratory qualitative study was to explore collegiate cybersecurity instructors' qualities needed to maximize the engagement of Generation Z cybersecurity learners to successfully become cybersecurity specialists. This understanding is important in order to increase the…
Descriptors: Information Security, Computer Security, Age Groups, Specialists
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers