Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Science Education | 8 |
Computer Security | 8 |
Engineering Education | 8 |
Experiential Learning | 3 |
Information Technology | 3 |
Accreditation (Institutions) | 2 |
Case Studies | 2 |
College Students | 2 |
Computer Networks | 2 |
Computer Software | 2 |
Educational Quality | 2 |
More ▼ |
Source
Journal of Information… | 2 |
Advances in Engineering… | 1 |
Contemporary Issues in… | 1 |
IEEE Transactions on Education | 1 |
International Association for… | 1 |
Journal of Cybersecurity… | 1 |
US Government Accountability… | 1 |
Author
Publication Type
Journal Articles | 6 |
Reports - Research | 5 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Audience
Location
Florida | 2 |
Saudi Arabia | 2 |
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
India | 1 |
Poland | 1 |
Russia | 1 |
South Africa | 1 |
Ukraine | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Almuhaideb, Abdullah M.; Saeed, Saqib – Journal of Information Systems Education, 2021
ABET accreditation has become a well-known standard for academic programs not only in the U.S. but also across the globe. Instantiating the processes to systematically improve the quality of programs is a daunting task for higher education institutions. In this contribution, we provide a detailed process-based framework that can assist aspiring…
Descriptors: Engineering Education, Accreditation (Institutions), Computer Security, Crime
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Harris, Mark A.; Patten, Karen P. – Journal of Information Systems Education, 2015
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Descriptors: Taxonomy, Computer Security, Curriculum Development, Undergraduate Study
Banfield, James; Wilkerson, Brad – Contemporary Issues in Education Research, 2014
The aim of this study was to assess gamification as a method of experiential learning theory (ELT) on student motivation and self-efficacy to perform System Engineering/Information Assurance (IA) tasks. The study was a basic qualitative method, whereby data was collected via semi-structured interview and then analyzed for recurring themes and…
Descriptors: Games, Experiential Learning, Learning Theories, Student Motivation
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Wilshusen, Gregory C.; Melvin, Valerie C. – US Government Accountability Office, 2009
The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…
Descriptors: Veterans, Public Agencies, Computer Security, Information Technology
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology