Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 5 |
| Integrated Curriculum | 5 |
| Computer Science Education | 2 |
| Courseware | 2 |
| Curriculum Development | 2 |
| Delivery Systems | 2 |
| Guidelines | 2 |
| Information Systems | 2 |
| Secondary Education | 2 |
| Access to Computers | 1 |
| Access to Information | 1 |
| More ▼ | |
Author
| Chandrasekhar, Arcot | 1 |
| Chu, Bill | 1 |
| Espiritu, Baltazar | 1 |
| Gruener, Gregory | 1 |
| Hoyt, Amy | 1 |
| Ladwig, Christine | 1 |
| Lipford, Heather Richter | 1 |
| McNulty, John | 1 |
| Price, Ron, Jr. | 1 |
| Redmann, Donna H., Ed. | 1 |
| Schwieger, Dana | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Collected Works - Serials | 1 |
| Opinion Papers | 1 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 1 |
Audience
Location
| North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler – Journal of Educational Computing Research, 2018
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Descriptors: Computer Security, Programming, Coding, Computer Science Education
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
McNulty, John; Chandrasekhar, Arcot; Hoyt, Amy; Gruener, Gregory; Espiritu, Baltazar; Price, Ron, Jr. – Journal of Educational Computing Research, 2011
This report summarizes more than a decade of experiences with implementing computer-based testing across a 4-year medical curriculum. Practical considerations are given to the fields incorporated within an item database and their use in the creation and analysis of examinations, security issues in the delivery and integrity of examinations,…
Descriptors: Educational Research, Testing, Integrity, Computer Assisted Testing
Zirkle, Chris – 2001
The Internet offers trade and industrial (T&I) educators a wealth of readily available information for use as teaching aids, supplemental materials, and laboratory resources. These materials provide many distinct benefits; however, there are also several issues that must be addressed when using the Internet as an adjunct in teaching. These…
Descriptors: Access to Computers, Access to Information, Computer Security, Computer Uses in Education
Redmann, Donna H., Ed. – Journal of Business and Training Education, 1999
This issue contains eight articles on a wide variety of topics in business and training education. "Ethics and beyond: Enhancing Communication and Critical Thinking Skills through Ethics Instruction" (Sandra A. Howard) offers strategies for incorporating ethics instruction in the business curriculum that can also enhance students'…
Descriptors: Adult Education, Business Correspondence, Business Education, Communication Skills

Peer reviewed
Direct link
