Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Security | 9 |
Curriculum Development | 9 |
Foreign Countries | 9 |
Information Security | 5 |
College Students | 3 |
Information Technology | 3 |
Internet | 3 |
Computer Science Education | 2 |
Computer Software | 2 |
Educational Technology | 2 |
Elementary Secondary Education | 2 |
More ▼ |
Source
Author
Arreerard, Woraphapa | 1 |
Bencheva, Nina | 1 |
Blažic, Borka Jerman | 1 |
Bystrova, Bogdana | 1 |
Fan, Andy | 1 |
Farkas, Robert | 1 |
Grindei, Laura | 1 |
Grout, Ian | 1 |
Jackson, Noel | 1 |
Krunic, Tanja | 1 |
Ligusova, Jana | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 7 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Elementary Secondary Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
China | 2 |
Australia | 1 |
Europe | 1 |
European Union | 1 |
Macau | 1 |
Netherlands | 1 |
North Carolina (Raleigh) | 1 |
Serbia | 1 |
Thailand | 1 |
Ukraine | 1 |
United States | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development
Bystrova, Bogdana – Comparative Professional Pedagogy, 2017
At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…
Descriptors: Comparative Analysis, Bachelors Degrees, Computer Security, Foreign Countries
Poboroniuc, Marian Silviu; Naaji, Antoanela; Ligusova, Jana; Grout, Ian; Popescu, Dorin; Ward, Tony; Grindei, Laura; Ruseva, Yoana; Bencheva, Nina; Jackson, Noel – World Journal on Educational Technology: Current Issues, 2017
The paper presents some results obtained through the implementation of the Erasmus LLP "SALEIE" (Strategic Alignment of Electrical and Information Engineering in European Higher Education Institutions). The aim of the project was to bring together experts from European universities to enhance the competitiveness of Electrical and…
Descriptors: Information Technology, Information Security, Computer Security, Engineering Education
Thompson, Roberta – Australian Educational Computing, 2016
Young people's online safety continues to be a high priority for educators and parents. Cybersafety policies and educational programs are continually updated and revised to accommodate for the innovative ways they engage with digital culture. However, empirical research has shown that despite these efforts young people, especially teen girls,…
Descriptors: Adolescents, Females, Computer Security, Safety
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Krunic, Tanja; Ruzic-Dimitrijevic, Ljiljana; Petrovic, Branka; Farkas, Robert – Journal of Information Technology Education, 2006
The Advanced Technical School from Novi Sad set up a completely new study group for web design in 2004. The main goals of the paper are to explain the steps that were taken in starting this group, and to present the educational program based on our own research through the organization of the group and course descriptions. Since there is a…
Descriptors: Investigations, Prior Learning, Course Descriptions, Internet