Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 4 |
Course Content | 4 |
Crime | 4 |
Teaching Methods | 3 |
Course Descriptions | 2 |
Lesson Plans | 2 |
Program Evaluation | 2 |
Academic Achievement | 1 |
Academic Persistence | 1 |
Apprenticeships | 1 |
Assistive Technology | 1 |
More ▼ |
Author
Belshaw, Scott H. | 1 |
Colaiuta, Alexandrea | 1 |
Foltz, C. Bryan | 1 |
Isaías, Pedro, Ed. | 1 |
Nodeland, Brooke | 1 |
Renwick, Janet S. | 1 |
Sánchez, Inmaculada… | 1 |
Underwood, Lorrin | 1 |
Publication Type
Journal Articles | 2 |
Collected Works - Proceedings | 1 |
Guides - Classroom - Learner | 1 |
Guides - Classroom - Teacher | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 1 |
Students | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Foltz, C. Bryan; Renwick, Janet S. – Journal of Education for Business, 2011
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Descriptors: Crime, Information Systems, Computer Security, College Programs
Sánchez, Inmaculada Arnedillo, Ed.; Isaías, Pedro, Ed. – International Association for Development of the Information Society, 2014
These proceedings contain the papers of the 10th International Conference on Mobile Learning 2014, which was organised by the International Association for Development of the Information Society, in Madrid, Spain, February 28-March 2, 2014. The Mobile Learning 2014 International Conference seeks to provide a forum for the presentation and…
Descriptors: Conference Papers, Telecommunications, Handheld Devices, Technology Uses in Education
Internal Revenue Service (Dept. of Treasury), Washington, DC. – 1994
This packet contains a textbook, an instructor's guide, and a student workbook for a course on conducting financial investigations to detect and solve crimes. The topics covered in the 11 chapters of the textbook and the ancillaries are the following: (1) why financial investigation?; (2) laws related to financial crimes; (3) evidence; (4) sources…
Descriptors: Banking, Classroom Techniques, Computer Security, Course Content