NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Equal Access1
What Works Clearinghouse Rating
Showing 106 to 120 of 217 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Yuli Deng – ProQuest LLC, 2021
Personalized learning is gaining popularity in online computer science education due to its characteristics of pacing the learning progress and adapting the instructional approach to each individual learner from a diverse background. Among various instructional methods in computer science education, hands-on labs have unique requirements of…
Descriptors: Individualized Instruction, Experiential Learning, Computer Science Education, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Jones, Keith S.; Namin, Akbar Siami; Armstrong, Miriam E. – ACM Transactions on Computing Education, 2018
Our cybersecurity workforce needs surpass our ability to meet them. These needs could be mitigated by developing relevant curricula that prioritize the knowledge, skills, and abilities (KSAs) most important to cybersecurity jobs. To identify the KSAs needed for performing cybersecurity jobs, we administered survey interviews to 44 cyber…
Descriptors: Computer Security, Job Skills, Computer Science Education, Professional Personnel
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ashley Kenway; Phil Wilkinson; Kieron Dowden-Smith – International Journal for Students as Partners, 2019
This article explores issues of student identity and identification through a third-space theory lens. In addition, it positions this use of third-space theory as contributory to Students-as-Partners (SaP) approaches to teaching and learning. Naturally, this research was constructed as a SaP project, and research was undertaken as a collaboration…
Descriptors: Self Concept, Undergraduate Students, Student Attitudes, Resistance (Psychology)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Burrell, Darrell Norman; Courtney-Dattola, Ashley; Burton, Sharon L.; Nobles, Calvin; Springs, Delores; Dawson, Maurice E. – International Journal of Information and Communication Technology Education, 2020
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own…
Descriptors: Internet, Instructional Improvement, Information Technology, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Dana Kube; Sebastian Gombert; Brigitte Suter; Joshua Weidlich; Karel Kreijns; Hendrik Drachsler – Journal of Computer Assisted Learning, 2024
Background: Gender stereotypes about women and men are prevalent in computer science (CS). The study's goal was to investigate the role of gender bias in computer-supported collaborative learning (CSCL) in a CS context by elaborating on gendered experiences in the perception of individual and team performance in mixed-gender teams in a hackathon.…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Gender Issues, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thomas, Kevin M.; Ivy, Jessica; Cook, Kristin; Kelley, Robert R. – Journal of Cybersecurity Education, Research and Practice, 2022
The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers' technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Kam, Hwee-Joo; Katerattanakul, Pairin – Journal of Information Technology Education: Innovations in Practice, 2019
Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to…
Descriptors: Academic Achievement, Learner Engagement, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Rice, Jeffrey Philip – ProQuest LLC, 2021
Using the lived experiences of study participants, the purpose of the exploratory qualitative study was to explore collegiate cybersecurity instructors' qualities needed to maximize the engagement of Generation Z cybersecurity learners to successfully become cybersecurity specialists. This understanding is important in order to increase the…
Descriptors: Information Security, Computer Security, Age Groups, Specialists
Pages: 1  |  ...  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  ...  |  15