Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Science Education | 4 |
Confidentiality | 4 |
Information Security | 4 |
Case Studies | 2 |
Computer Security | 2 |
Privacy | 2 |
Active Learning | 1 |
Capstone Experiences | 1 |
Coding | 1 |
College Students | 1 |
Community Organizations | 1 |
More ▼ |
Source
Information Systems Education… | 1 |
Journal of Higher Education… | 1 |
Journal of Information… | 1 |
Journal of Technology and… | 1 |
Author
Arboledas-Brihuega, David | 1 |
Dalal, Amy Csizmar | 1 |
Ibrahim, Walid | 1 |
Ladwig, Christine | 1 |
Oliver, Emily | 1 |
Schwieger, Dana | 1 |
Trabelsi, Zouheir | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Minnesota | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dalal, Amy Csizmar; Oliver, Emily – Journal of Higher Education Outreach and Engagement, 2022
We present a case study of a multi-year, academic civic engagement (ACE) collaboration in a computer science capstone course. ACE projects in computer science provide an avenue for students to apply software development concepts to real-world projects with actual clients, and can offer meaningful engagement with ethical issues. The typical…
Descriptors: Case Studies, Computer Science Education, Capstone Experiences, Outcomes of Education
Arboledas-Brihuega, David – Journal of Technology and Science Education, 2019
It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in…
Descriptors: Mathematics, Curriculum Implementation, Active Learning, Student Projects
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality