Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Science Education | 3 |
| Computer Security | 3 |
| Questionnaires | 3 |
| Case Studies | 2 |
| Information Security | 2 |
| Information Technology | 2 |
| Active Learning | 1 |
| Career Choice | 1 |
| Case Method (Teaching… | 1 |
| Class Activities | 1 |
| College Instruction | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Woszczynski, Amy B.; Shade, Sherri – Journal of Information Systems Education, 2010
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed…
Descriptors: Females, Computer Security, Gender Bias, Disproportionate Representation

Peer reviewed
Direct link
