Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Science Education | 7 |
Computer Security | 7 |
Technology | 7 |
Programming | 3 |
College Students | 2 |
Computer Software | 2 |
Computer Uses in Education | 2 |
Information Security | 2 |
Programming Languages | 2 |
Student Surveys | 2 |
Undergraduate Students | 2 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Educational Technology &… | 1 |
Educom Review | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
Journal of Technology and… | 1 |
PRIMUS | 1 |
Author
Chen, Li-Chiou | 1 |
Christine Wusylko | 1 |
Daniel L. Segal | 1 |
David Kocsis | 1 |
David P. Bunde | 1 |
Gordon, Barbara | 1 |
John F. Dooley | 1 |
Kara Dawson | 1 |
Kempner, Yulia | 1 |
Kortsarts, Yana | 1 |
Lukowiak, Marcin | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 5 |
Reports - Research | 2 |
Tests/Questionnaires | 2 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Elementary Education | 1 |
Audience
Teachers | 2 |
Location
New York | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Gordon, Barbara – Educom Review, 1996
Java is an object-oriented programming language developed by Sun Microsystems; its benefits include platform independence, security, and interactivity. Within the college community, Java is being used in programming courses, collaborative technology research projects, computer graphics instruction, and distance education. (AEF)
Descriptors: Computer Graphics, Computer Science Education, Computer Security, Computer Uses in Education