Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 12 |
Since 2006 (last 20 years) | 24 |
Descriptor
Computer Networks | 26 |
Computer Science Education | 26 |
Computer Security | 26 |
Computer Software | 10 |
Information Technology | 10 |
Information Security | 9 |
Internet | 7 |
College Students | 6 |
Educational Technology | 6 |
Experiential Learning | 6 |
Programming | 6 |
More ▼ |
Source
Author
Durkin, Sarah S. | 2 |
Fees, Rachel E. | 2 |
Moran, Angela L. | 2 |
Murray, Mark M. | 2 |
da Rosa, Jennifer A. | 2 |
Abhishek Vaish | 1 |
Ambraziene, Danute | 1 |
Amin, Rohan Mahesh | 1 |
Archer, Ricky | 1 |
Astrom, Peik | 1 |
Bergstrom, Laura | 1 |
More ▼ |
Publication Type
Journal Articles | 24 |
Reports - Descriptive | 15 |
Reports - Research | 8 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 18 |
Postsecondary Education | 13 |
Elementary Secondary Education | 5 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
Florida | 2 |
Maryland | 2 |
Ohio | 2 |
Pennsylvania | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Kevin Hilliard; Xiaohong Yuan; Kelvin Bryant; Jinsheng Xu; Jinghua Zhang – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course…
Descriptors: Gamification, Mastery Learning, Computer Security, Computer Networks
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – International Journal of Computer Science Education in Schools, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – Online Submission, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Previous Page | Next Page ยป
Pages: 1 | 2