Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 8 |
Descriptor
| Coding | 9 |
| Computer Security | 9 |
| Computer Software | 9 |
| Programming | 5 |
| Computer Science Education | 4 |
| Error Correction | 4 |
| Computers | 3 |
| Teaching Methods | 3 |
| Comparative Analysis | 2 |
| Computer Networks | 2 |
| Data Analysis | 2 |
| More ▼ | |
Source
| ProQuest LLC | 2 |
| ACM Transactions on Computing… | 1 |
| Interdisciplinary Journal of… | 1 |
| International Educational… | 1 |
| Journal of Cybersecurity… | 1 |
| Journal of Educational… | 1 |
| Online Submission | 1 |
Author
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Dissertations/Theses -… | 2 |
| Collected Works - Proceedings | 1 |
| Collected Works - Serial | 1 |
| Guides - Non-Classroom | 1 |
| Reports - Evaluative | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Secondary Education | 2 |
| Elementary Education | 1 |
| Grade 11 | 1 |
| Grade 12 | 1 |
| Grade 6 | 1 |
| High Schools | 1 |
| Intermediate Grades | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| More ▼ | |
Audience
Location
| Finland | 1 |
| France | 1 |
| Israel | 1 |
| Maryland | 1 |
| North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler – Journal of Educational Computing Research, 2018
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Descriptors: Computer Security, Programming, Coding, Computer Science Education
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming
Boutnaru, Shlomi; Hershkovitz, Arnon – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2015
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…
Descriptors: Computer Software, Computer Security, Programming Languages, Computer Science Education
Xie, Jing – ProQuest LLC, 2012
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Descriptors: Computer Software, Computer Security, Programming, Interaction
Adamo, Oluwayomi – ProQuest LLC, 2011
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
Descriptors: Coding, Technology, Error Correction, Computer Software
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection

Peer reviewed
Direct link
