Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Foreign Countries | 4 |
Industry | 4 |
Engineering | 2 |
Engineering Education | 2 |
Information Security | 2 |
Information Technology | 2 |
Artificial Intelligence | 1 |
Audits (Verification) | 1 |
Best Practices | 1 |
COVID-19 | 1 |
More ▼ |
Author
Aditya Narayan Hati | 1 |
Anwesa Das | 1 |
Battisti, F. | 1 |
Bernard Ngalim | 1 |
Boato, G. | 1 |
Brooks, D. Christopher | 1 |
Carli, M. | 1 |
Kelly, Brian | 1 |
McCormack, Mark | 1 |
Neri, A. | 1 |
O'Brien, John | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Anwesa Das; Vinay Kumar; Aditya Narayan Hati; Sharda Bharti – IEEE Transactions on Education, 2024
Machine learning (ML) is increasingly utilized in the development and assurance of safety-critical systems (SCSs) nowadays, much like other complex problems. Safety is the topmost priority in SCS, hence, developers who are working in this area must possess extensive knowledge of both ML and SCS. This article presents a methodical investigation…
Descriptors: Artificial Intelligence, Computer Security, Engineering Education, Engineering
Kelly, Brian; McCormack, Mark; Reeves, Jamie; Brooks, D. Christopher; O'Brien, John – EDUCAUSE, 2021
In 2021, EDUCAUSE is publishing a second edition of the "Horizon Report." With this inaugural issue of the Information Security edition of the "Horizon Report," EDUCAUSE has sought to expand their series of Teaching and Learning "Horizon Reports" to focus on a new area of critical importance to the future of higher…
Descriptors: Information Security, Higher Education, Educational Trends, COVID-19
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications