Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
ACM Transactions on Computing… | 1 |
Advances in Engineering… | 1 |
Education Commission of the… | 1 |
Journal of Cybersecurity… | 1 |
Online Submission | 1 |
Tech Directions | 1 |
Author
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Numerical/Quantitative Data | 2 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Elementary Secondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Florida | 6 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Maral Kargarmoakhar; Monique Ross; Zahra Hazari; Stephen Secules; Mark Allen Weiss; Michael Georgiopoulos; Kenneth Christensen; Tiana Solis – ACM Transactions on Computing Education, 2024
While computing programs in the U.S. are experiencing growth in enrollment trends, they are still grappling with matters related to retention and persistence of computing undergraduates. One construct identified by scholars as having an impact on persistence in computing is computing identity, which is shaped by constructs such as recognition,…
Descriptors: Communities of Practice, Scholarships, Computer Science Education, Self Concept
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Education Commission of the States, 2018
Business leaders in Florida cannot find the science, technology, engineering and mathematics (STEM) talent they need to stay competitive. Students' lagging performance in K-12 is a critical reason why. The good news is that the nation's most effective STEM education programs can help turn the tide. Students in Florida have made some progress in…
Descriptors: STEM Education, Elementary Secondary Education, Demand Occupations, Mathematics Achievement
Van Name, Barry – Tech Directions, 2012
There is a battlefield where no quarter is given, no mercy shown, but not a single drop of blood is spilled. It is an arena that witnesses the bringing together of high-tech design and manufacture with the outpouring of brute force, under the remotely accessed command of some of today's brightest students. This is the world of battling robots, or…
Descriptors: Females, Engineering, Computer Assisted Design, High School Students
Micceri, Theodore – Online Submission, 2005
The purpose of this exercise was to determine whether any of the available demographic or academic variables show distinct trends in three specific discipline areas that differ from those of other areas: (1) Engineering, (2) Computer Sciences, and (3) Biological Sciences. Using data from 39,087 SUS graduates in 2002-03 and of 324,164 science…
Descriptors: Physics, Ethnic Groups, Biology, Transfer Students