Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Security | 11 |
Engineering | 11 |
Undergraduate Students | 5 |
Computer Networks | 4 |
Foreign Countries | 4 |
Telecommunications | 4 |
Business | 3 |
Computer Science | 3 |
Cooperative Learning | 3 |
Data | 3 |
Information Technology | 3 |
More ▼ |
Source
ProQuest LLC | 3 |
IEEE Transactions on Education | 2 |
Journal of Information… | 2 |
American Association of… | 1 |
Information Science Publishing | 1 |
International Association for… | 1 |
Journal of STEM Outreach | 1 |
Author
Aditya Narayan Hati | 1 |
Anwesa Das | 1 |
Battisti, F. | 1 |
Boato, G. | 1 |
Carli, M. | 1 |
Daniel L. Segal | 1 |
David Kocsis | 1 |
Elahi, Behim | 1 |
Essig, Rebecca R. | 1 |
He, Wu | 1 |
Hung, Jason | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 4 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 2 |
Books | 1 |
Collected Works - Proceedings | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 6 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Connecticut | 2 |
Italy | 2 |
Ohio | 2 |
Singapore | 2 |
United States | 2 |
Alabama | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Denmark | 1 |
Egypt | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Anwesa Das; Vinay Kumar; Aditya Narayan Hati; Sharda Bharti – IEEE Transactions on Education, 2024
Machine learning (ML) is increasingly utilized in the development and assurance of safety-critical systems (SCSs) nowadays, much like other complex problems. Safety is the topmost priority in SCS, hence, developers who are working in this area must possess extensive knowledge of both ML and SCS. This article presents a methodical investigation…
Descriptors: Artificial Intelligence, Computer Security, Engineering Education, Engineering
Payne, Brian K.; He, Wu; Wang, Cong; Wittkower, D. E.; Wu, Hongyi – Journal of Information Systems Education, 2021
This paper describes an interdisciplinary effort involving faculty from five different disciplines who came together to develop an interdisciplinary, open, general education cybersecurity course. The course, Cybersecurity, Technology, and Society, brings together ideas from interdisciplinary studies, information technology, engineering, business,…
Descriptors: Computer Security, Interdisciplinary Approach, Curriculum Development, General Education
Essig, Rebecca R.; Elahi, Behim; Hunter, Jennifer L.; Mohammadpour, Atefeh; O'Connor, Kimberly W. – Journal of STEM Outreach, 2020
"Future Girls of STEM" is a university-sponsored, summer camp outreach program that was designed and implemented by an all-female faculty group to increase young girls' interest in pursuing future careers in science, technology, engineering, and mathematics (STEM). This paper discusses the logistics and results of the pilot Future Girls…
Descriptors: Females, Camps, STEM Education, Engineering
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Singh, Anand – ProQuest LLC, 2009
manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…
Descriptors: Risk Management, Risk, Engineering, Vendors
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Shih, Timothy; Hung, Jason – Information Science Publishing, 2007
Future Directions in Distance Learning and Communication Technologies presents theoretical studies and practical solutions for engineers, educational professionals, and graduate students in the research areas of e-learning, distance education, and instructional design. This book provides readers with cutting-edge solutions and research directions…
Descriptors: Electronic Learning, Distance Education, Instructional Design, Privacy
American Association of Community Colleges (NJ1), 2006
This publication includes 13 articles: (1) ATE [Advanced Technological Education] Attuned to Global Competition; (2) Materials Science Center Supplies Information on Often-Overlooked Field; (3) CSEC [Cyber Security Education Consortium] Builds Corps of Cyber Technicians; (4) KCTCS [Kentucky Community and Technical College System] Is U.S. Partner…
Descriptors: Technology Education, Technical Education, Community Colleges, Faculty Development
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers