Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Computer Software | 6 |
Guidelines | 6 |
Educational Technology | 3 |
Computer Science Education | 2 |
Distance Education | 2 |
Information Security | 2 |
Internet | 2 |
Online Courses | 2 |
Student Attitudes | 2 |
Barriers | 1 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Journal of Educational… | 1 |
Online Journal of Distance… | 1 |
ProQuest LLC | 1 |
T.H.E. Journal | 1 |
Technology, Pedagogy and… | 1 |
Author
Abdel-Karim Al-Tamimi | 1 |
Estes, Aaron | 1 |
Khalid Samara | 1 |
Maher Salem | 1 |
Powell, Ken | 1 |
Russell, Terry | 1 |
Shaffer, Steven C. | 1 |
Straub, Jeremy | 1 |
Waters, John K. | 1 |
Wickens, Cathy | 1 |
Woollard, John | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Straub, Jeremy – Journal of Educational Technology Systems, 2014
The development of software for spacecraft represents a particular challenge and is, in many ways, a worst case scenario from a design perspective. Spacecraft software must be "bulletproof" and operate for extended periods of time without user intervention. If the software fails, it cannot be manually serviced. Software failure may…
Descriptors: Comparative Analysis, Computer Software, Computer Science Education, Educational Technology
Shaffer, Steven C. – Online Journal of Distance Learning Administration, 2012
Assessment is an important part of distance education (DE). As class sizes get larger and workloads increase, the IT infrastructure and processes used for DE assessments become more of an issue. Using the BS ISO/IEC 23988:2007 Standard for the use of technology in the delivery of assessments as a guide, this paper describes a rational approach to…
Descriptors: Distance Education, Educational Technology, Disadvantaged, Quality Assurance
Waters, John K. – T.H.E. Journal, 2009
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Descriptors: Internet, School Districts, Computer Software, Web Sites
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law