Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Science Education | 3 |
Computer Security | 3 |
Statistical Analysis | 3 |
Coding | 2 |
Programming | 2 |
Access to Information | 1 |
Classification | 1 |
Comparative Analysis | 1 |
Computer Mediated… | 1 |
Computer Networks | 1 |
Computer Science | 1 |
More ▼ |
Author
Amin, Rohan Mahesh | 1 |
Boutnaru, Shlomi | 1 |
Chaplik, Andrew M. | 1 |
Hamman, Seth T. | 1 |
Hershkovitz, Arnon | 1 |
Hopkinson, Kenneth M. | 1 |
Markham, Ruth L. | 1 |
Metzler, Gabrielle E. | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 2 |
Grade 11 | 1 |
Grade 12 | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Israel | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Boutnaru, Shlomi; Hershkovitz, Arnon – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2015
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…
Descriptors: Computer Software, Computer Security, Programming Languages, Computer Science Education
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis