Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 13 |
Descriptor
Computer Science Education | 15 |
Public Agencies | 15 |
Computer Security | 6 |
Higher Education | 5 |
Information Security | 5 |
Barriers | 4 |
Federal Government | 4 |
Federal Legislation | 4 |
Information Technology | 4 |
National Security | 4 |
Access to Education | 3 |
More ▼ |
Source
Author
Al-Khasawneh, Ahmad | 1 |
Blackman, Harvey | 1 |
Chiang, LiChun | 1 |
Clark, Ulku | 1 |
Hammad, Bashar K. | 1 |
Ida L. Oesteraas | 1 |
Irwin, Gretchen | 1 |
Jacqueline M. Nowicki | 1 |
Knapp, Kenneth J. | 1 |
Liao, Chao-ning | 1 |
MacDonald, Laurie E. | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 6 |
Reports - Research | 5 |
Reports - Evaluative | 3 |
Information Analyses | 2 |
Legal/Legislative/Regulatory… | 2 |
Collected Works - Proceedings | 1 |
Numerical/Quantitative Data | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 8 |
Elementary Secondary Education | 3 |
Adult Education | 1 |
Audience
Policymakers | 2 |
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jacqueline M. Nowicki – US Government Accountability Office, 2024
The Department of Education (Education) awarded about $6 billion in discretionary grants during fiscal year 2023, with the largest proportion of grant programs administered by the Office of Elementary and Secondary Education (OESE). These grants are awarded competitively to recipients such as states and school districts. Education sometimes…
Descriptors: Elementary Secondary Education, Public Agencies, Decision Making, Grantsmanship
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Yoshida, R.; Page, R. – PRIMUS, 2022
In the fall of 2009 and in the spring of 2012, supported by the National Institute of General Medical Sciences (NIGMS) in the National Institutes of Health (NIH), we designed a course "Phylogenetic Analysis and Molecular Evolution" (PAME), the first cross-listed course across three different colleges (College of Arts and Sciences,…
Descriptors: Molecular Biology, Evolution, Molecular Structure, Graduate Students
Clark, Ulku; Stoker, Geoff; Vetter, Ron – Information Systems Education Journal, 2020
The rising number and cost of cybersecurity attacks justifies continued strong interest in the National Security Agency (NSA) and Department of Homeland Security (DHS) jointly sponsored program for National Centers of Academic Excellence in Cyber Defense (CAE-CD). After briefly outlining the current state of the cybersecurity challenge, this…
Descriptors: Educational Change, Information Security, Public Agencies, National Security
Tsado, Lucy – Journal of Cybersecurity Education, Research and Practice, 2019
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not…
Descriptors: Information Security, National Security, Computer Security, Computer Science Education
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Executive Office of the President, 2016
As called for in the America COMPETES Reauthorization Act of 2010, the National Science and Technology Council's (NSTC) Committee on STEM Education (CoSTEM) released, in May of 2013, the Federal Science, Technology, Engineering, and Mathematics (STEM) Education 5- Year Strategic Plan (Strategic Plan). As required by the Act, this report includes…
Descriptors: STEM Education, Strategic Planning, Federal Legislation, Educational Research
Al-Khasawneh, Ahmad; Hammad, Bashar K. – Education for Information, 2013
Service learning methodologies provide information systems students with the opportunity to create and implement systems in real-world, public service-oriented social contexts. This paper presents a case study of integrating a service learning project into an undergraduate Computer Information Systems course titled "Information Systems"…
Descriptors: Foreign Countries, Service Learning, Civics, Citizen Participation
Irwin, Gretchen; Wessel, Lark; Blackman, Harvey – Journal of Information Systems Education, 2012
This case describes a database redesign project for the United States Department of Agriculture's National Animal Germplasm Program (NAGP). The case provides a valuable context for teaching and practicing database analysis, design, and implementation skills, and can be used as the basis for a semester-long team project. The case demonstrates the…
Descriptors: Course Descriptions, Genetics, Animals, Animal Husbandry
Wilshusen, Gregory C.; Melvin, Valerie C. – US Government Accountability Office, 2009
The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…
Descriptors: Veterans, Public Agencies, Computer Security, Information Technology
Liao, Chao-ning; Chiang, LiChun – Educational Technology & Society, 2008
To help the civil servants in both central and local governments in Taiwan operating administrative works smoothly under a new digitalized system launched in 1994, a series of courses related to information technology were offered free to them annually by the central governments. However, due to the budget deficit in recent years, the government…
Descriptors: Information Technology, Foreign Countries, City Government, Public Policy
Prichard, Janet J.; MacDonald, Laurie E. – Journal of Information Technology Education, 2004
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
Descriptors: Terrorism, Textbooks, Computer Security, Public Agencies
Wasley, Paula – Chronicle of Higher Education, 2008
This article talks about a software designed by the University of Phoenix for its business, information-technology, education, and health-care courses. Through the university's "virtual organizations"--online teaching tools designed to simulate the experience of working at a typical corporation, school, or government agency, Phoenix students can…
Descriptors: Feedback (Response), World Problems, Employees, Distance Education
Congress of the U.S., Washington, DC. Senate Committee on Commerce, Science, and Transportation. – 1990
This committee report is intended to accompany S. 1067, a bill designed to provide for a coordinated federal research program in high-performance computing (HPC). The primary objective of the legislation is given as the acceleration of research, development, and application of the most advanced computing technology in research, education, and…
Descriptors: Computer Networks, Computer Science Education, Computer Software Development, Computer System Design
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers