Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Science Education | 3 |
Computer Security | 3 |
Questionnaires | 3 |
Case Studies | 2 |
Information Security | 2 |
Information Technology | 2 |
Active Learning | 1 |
Career Choice | 1 |
Case Method (Teaching… | 1 |
Class Activities | 1 |
College Instruction | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Woszczynski, Amy B.; Shade, Sherri – Journal of Information Systems Education, 2010
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed…
Descriptors: Females, Computer Security, Gender Bias, Disproportionate Representation