Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 12 |
Descriptor
Computer Security | 15 |
Course Descriptions | 15 |
Information Security | 7 |
Foreign Countries | 5 |
Undergraduate Students | 5 |
Course Content | 4 |
Teaching Methods | 4 |
Computer Networks | 3 |
Computer Science Education | 3 |
Curriculum Design | 3 |
Educational Technology | 3 |
More ▼ |
Source
Author
Astrom, Peik | 1 |
Babb, Jeffry S. | 1 |
Belshaw, Scott H. | 1 |
Bergstrom, Laura | 1 |
Bhunia, Swarup | 1 |
Braiko, Bohdan | 1 |
Chen, Frankie | 1 |
Colaiuta, Alexandrea | 1 |
Crawford, Margaret, Ed. | 1 |
Deloris Y. McBride | 1 |
Farkas, Robert | 1 |
More ▼ |
Publication Type
Journal Articles | 11 |
Reports - Research | 7 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 2 |
Collected Works - Proceedings | 1 |
Guides - Classroom - Teacher | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 14 |
Postsecondary Education | 10 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Texas | 2 |
Asia | 1 |
Canada | 1 |
European Union | 1 |
Finland | 1 |
Florida | 1 |
Greece | 1 |
Massachusetts | 1 |
Serbia | 1 |
Ukraine | 1 |
United Kingdom | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Herr, Trey; Laudrain, Arthur P. B.; Smeets, Max – Journal of Political Science Education, 2021
Colleges and universities continue to expand their curricula to include cybersecurity as an explicit course of study in political science. But what is taught in a course on cybersecurity? Are syllabi deep dives into technology, broad romps through contemporary policy debates, or do they reflect a more varied disposition? Studying the syllabi of an…
Descriptors: Computer Science Education, Computer Security, Information Security, Political Science
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Deloris Y. McBride – ProQuest LLC, 2021
As the global need for unfilled cybersecurity positions is projected to reach nearly 3.5 million by 2021, cybercrime proliferates. Talent shortage in cybersecurity continues to reach widespread magnitudes and individuals are inadequately prepared to assume positions requiring significant responsibilities. The challenge of filling the cybersecurity…
Descriptors: Computer Security, Curriculum Design, Career Readiness, Job Skills
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Braiko, Bohdan – Comparative Professional Pedagogy, 2019
The article deals with the relevant problem of updating the system of graduate training (master's degree) in Ukraine. It analyzes the ways of Ukraine's integration into the European Higher Education Area and the legal framework of higher education in Ukraine and the UK. It also presents a comparative pedagogical analysis of the features of…
Descriptors: Comparative Education, Information Security, Computer Security, Masters Programs
Murphy, Colleen F. – ProQuest LLC, 2018
By 2020, the global need for information security professionals is expected to reach six million and the shortfall in meeting that need is expected to be over one and a half million. Not only is there a shortage of cybersecurity professionals but those who are graduates of a cybersecurity program are not adequately skilled to assume significant…
Descriptors: Instructional Design, Computer Security, Information Security, Labor Force Development
Hanbidge, Alice Schmidt; Mackenzie, Amanda; Sanderson, Nicole; Scholz, Kyle; Tin, Tony – International Association for Development of the Information Society, 2017
How do we close the gap between the lack of academic experience incoming students have--with the expectation that students know the rules of writing and taking exams? Academic integrity (AI) is essential in post-secondary academia yet insufficient time is allocated to teaching and practicing its concepts. Talks at orientation, lectures in the…
Descriptors: Academic Achievement, Integrity, Telecommunications, Handheld Devices
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching
Smith, Clifton – Australian Science Teachers' Journal, 2001
Describes the development of a security science degree as the emerging applied science of the protection of individuals and assets. Proposes the themes of physical, electronic, information security and facility management as scientific applications for the course. (Author/MM)
Descriptors: Computer Security, Course Descriptions, Higher Education, Science Education
Krunic, Tanja; Ruzic-Dimitrijevic, Ljiljana; Petrovic, Branka; Farkas, Robert – Journal of Information Technology Education, 2006
The Advanced Technical School from Novi Sad set up a completely new study group for web design in 2004. The main goals of the paper are to explain the steps that were taken in starting this group, and to present the educational program based on our own research through the organization of the group and course descriptions. Since there is a…
Descriptors: Investigations, Prior Learning, Course Descriptions, Internet
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks
Simonson, Michael, Ed.; Crawford, Margaret, Ed. – Association for Educational Communications and Technology, 2004
For the twenty-seventh year, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the National AECT Convention in Chicago, Illinois. The Proceedings of AECT's Convention are published in two…
Descriptors: Research and Development, Communications, Educational Technology, Mathematics Instruction