Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 13 |
Descriptor
Computer Science Education | 13 |
Curriculum Development | 13 |
Information Security | 13 |
Computer Security | 10 |
Models | 5 |
Graduate Students | 4 |
Information Systems | 4 |
Computer Software | 3 |
Educational Objectives | 3 |
Ethics | 3 |
Foreign Countries | 3 |
More ▼ |
Source
Author
Alhamdani, Wasim A. | 1 |
Ali, Azad | 1 |
Blažic, Borka Jerman | 1 |
Brandi Robinson | 1 |
Cathy Horn | 1 |
Cook, Kristin | 1 |
Davis, Gary A. | 1 |
Deniz Gurkan | 1 |
Ivy, Jessica | 1 |
Jennifer B. Chauvot | 1 |
Kelley, Robert R. | 1 |
More ▼ |
Publication Type
Journal Articles | 11 |
Reports - Research | 9 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Shapna Sultana Pal – ProQuest LLC, 2022
Educators of graduate cybersecurity education lack decision methodologies to aid in selecting and prioritizing cybersecurity criteria and tools to provide hands-on learning in cyber courses. Educators are challenged with keeping the cybersecurity tools in the education curriculum relevant and updated. The risk of not doing so, is possibly…
Descriptors: Computer Security, Information Security, Computer Science Education, Decision Making
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Sreynet Un – Journal of Educational Technology and Online Learning, 2025
Since its emergence, technology has progressed beyond knowledge. Therefore, competencies are needed to navigate it safely, responsibly, and ethically. A well-designed curriculum forms the core of school strategies to enhance students' competencies and learning outcomes. This study examines the integration of digital citizenship concepts in…
Descriptors: Secondary School Students, Curriculum Development, Educational Strategies, Outcomes of Education
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Thomas, Kevin M.; Ivy, Jessica; Cook, Kristin; Kelley, Robert R. – Journal of Cybersecurity Education, Research and Practice, 2022
The purpose of this study was to examine the impact of a GenCyber camp curriculum on teachers' technology, pedagogy, and content knowledge (TPACK). The camp was designed to engage participants in developing the knowledge and skills to incorporate GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019) into…
Descriptors: Technological Literacy, Pedagogical Content Knowledge, Information Security, Computer Security
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Lawler, James P. – Information Systems Education Journal, 2011
The cloud continues to be a developing area of information systems. Evangelistic literature in the practitioner field indicates benefit for business firms but disruption for technology departments of the firms. Though the cloud currently is immature in methodology, this study defines a model program by which computer science and information…
Descriptors: Computer Science Education, Information Science Education, Information Systems, Computer Software
Wood, David F.; Kohun, Frederick G.; Ali, Azad; Paullet, Karen; Davis, Gary A. – Information Systems Education Journal, 2010
This paper frames the recent ABET accreditation model with respect to the balance between IS programs and innovation. With the current relaxation of the content of the information systems requirement by ABET, it is possible to include innovation into the accreditation umbrella. To this extent this paper provides a curricular model that provides…
Descriptors: Information Systems, Information Security, Accreditation (Institutions), Educational Innovation
Wang, Jianjun – Grantee Submission, 2013
On September 22, 2012, NSF announced its decision to fund a three-year project, "Models for Information Assurance Education and Outreach" (MIAEO). In the first year of grant operation, MIAEO has invited 18 high school students, two K-12 teachers, and two CSUB student assistants to conduct research explorations in the fields of…
Descriptors: Information Security, Computer Science Education, Improvement Programs, Program Effectiveness