Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Educational Technology | 3 |
| Barriers | 2 |
| College Faculty | 2 |
| Computer Networks | 2 |
| Computer Simulation | 2 |
| Database Management Systems | 2 |
| Educational Practices | 2 |
| Faculty Development | 2 |
| Higher Education | 2 |
| Information Science Education | 2 |
| More ▼ | |
Author
| Baker, Elizabeth | 1 |
| Mayes, Lisa | 1 |
| Paredes, Tisha | 1 |
| Payne, Brian K. | 1 |
| Reinicke, Bryan | 1 |
| Smith, Elizabeth | 1 |
| Toothman, Callie | 1 |
| Wu, Hongyi | 1 |
| Xin, ChunSheng | 1 |
Publication Type
| Journal Articles | 2 |
| Collected Works - Proceedings | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Elementary Secondary Education | 1 |
Audience
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| Greece | 1 |
| Hawaii | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Payne, Brian K.; Mayes, Lisa; Paredes, Tisha; Smith, Elizabeth; Wu, Hongyi; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university's undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and…
Descriptors: Interdisciplinary Approach, Information Security, Computer Security, Information Science Education
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
