NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Equal Access1
What Works Clearinghouse Rating
Showing 121 to 135 of 217 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Gomillion, David – Information Systems Education Journal, 2018
Demand for graduates with cybersecurity skills continues to increase. Many universities have developed or are in the process of developing new courses or degree programs to meet student demand and fill the skill gap in industry. Instructors face unique challenges when developing cybersecurity courses: While it is widely recognized that hands-on…
Descriptors: Computer Security, Curriculum Development, Computer Science Education, Experiential Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Jeong; Lee, Young; Fernandez, Amanda; Sanchez, Joshua – Journal of Cybersecurity Education, Research and Practice, 2020
As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure…
Descriptors: Computer Security, Programming Languages, Programming, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Payne, Bryson R. – Journal of Cybersecurity Education, Research and Practice, 2019
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semiautonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number…
Descriptors: Computer Security, Motor Vehicles, Information Security, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ivy, Jessica; Kelley, Robert; Cook, Kristin; Thomas, Kevin – International Journal of Computer Science Education in Schools, 2020
Although many practicing teachers have not experienced teacher preparation programs that teach cyber security (Pusely & Sadera, 2011) or are familiar with cyber principles (Authors), embedding these ideas into instruction in a variety of content areas is essential for promoting cyber literacy and citizenship. This study explores a professional…
Descriptors: Secondary School Curriculum, High School Teachers, Middle School Teachers, Faculty Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lesko, Charles J., Jr. – Journal of Cybersecurity Education, Research and Practice, 2019
Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the…
Descriptors: Needs Assessment, Computer Security, Design, Computer Centers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Payne, Brian K.; Vandecar-Burdin, Tancy; Cigularova, Daniela – NACADA Journal, 2022
In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the…
Descriptors: Information Security, Information Technology, Community Colleges, College Faculty
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tsado, Lucy – Journal of Cybersecurity Education, Research and Practice, 2019
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not…
Descriptors: Information Security, National Security, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Bohler, Jeffrey A.; Larson, Benjamin; Peachey, Todd A.; Shehane, Ronald F. – Journal of Information Systems Education, 2020
Information systems education objectives must continually adapt to a dynamic marketplace for knowledge and skills. For faculty developing programs that better prepare students for this demanding environment, existing research and guidelines provide a foundation to develop relevant coursework. However, an examination of peer institutions indicates…
Descriptors: Information Systems, Computer Science Education, Curriculum Evaluation, Guidelines
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Pages: 1  |  ...  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15