Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Science Education | 2 |
Information Security | 2 |
Pretests Posttests | 2 |
Class Activities | 1 |
College Students | 1 |
Computer Assisted Testing | 1 |
Computer Literacy | 1 |
Computer Security | 1 |
Control Groups | 1 |
Crime | 1 |
Electronic Mail | 1 |
More ▼ |
Author
Chaplik, Andrew M. | 1 |
Courte, Jill | 1 |
Hamman, Seth T. | 1 |
Hopkinson, Kenneth M. | 1 |
Markham, Ruth L. | 1 |
Metzler, Gabrielle E. | 1 |
Werner, Laurie A. | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Werner, Laurie A.; Courte, Jill – Information Systems Education Journal, 2010
Despite advances in spam detection software, anti-spam laws, and increasingly sophisticated users, the number of successful phishing scams continues to grow. In addition to monetary losses attributable to phishing, there is also a loss of confidence that stifles use of online services. Using in-class activities in an introductory computer course…
Descriptors: Information Security, Crime, Prevention, Class Activities