Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Higher Education | 9 |
Privacy | 9 |
Computer Science Education | 7 |
Computer Software | 4 |
Teaching Methods | 4 |
College Students | 3 |
Computer Science | 3 |
Curriculum | 3 |
Data Analysis | 3 |
Data Collection | 3 |
Elementary Secondary Education | 3 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Collected Works - Proceedings | 2 |
Legal/Legislative/Regulatory… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Elementary Secondary Education | 3 |
Secondary Education | 2 |
Grade 9 | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 1 |
Location
Brazil | 2 |
Connecticut | 2 |
Germany | 2 |
Arkansas | 1 |
Asia | 1 |
Australia | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Casola, Linda – National Academies Press, 2020
Established in December 2016, the National Academies of Sciences, Engineering, and Medicine's Roundtable on Data Science Postsecondary Education was charged with identifying the challenges of and highlighting best practices in postsecondary data science education. Convening quarterly for 3 years, representatives from academia, industry, and…
Descriptors: Meetings, Data Analysis, Postsecondary Education, Statistics Education
Bender, Elena; Schaper, Niclas; Caspersen, Michael E.; Margaritis, Melanie; Hubwieser, Peter – Studies in Higher Education, 2016
How teachers are able to adapt to a changing environment is essentially dependent on their beliefs and motivational orientations. The development of these aspects in the context of professional competence takes place during teachers' educational phase and professional practice. The overall understanding of professional competence for teaching…
Descriptors: Adjustment (to Environment), Teacher Attitudes, Teacher Competencies, Computer Science Education
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Rafferty, Anna N., Ed.; Whitehill, Jacob, Ed.; Romero, Cristobal, Ed.; Cavalli-Sforza, Violetta, Ed. – International Educational Data Mining Society, 2020
The 13th iteration of the International Conference on Educational Data Mining (EDM 2020) was originally arranged to take place in Ifrane, Morocco. Due to the SARS-CoV-2 (coronavirus) epidemic, EDM 2020, as well as most other academic conferences in 2020, had to be changed to a purely online format. To facilitate efficient transmission of…
Descriptors: Educational Improvement, Teaching Methods, Information Retrieval, Data Processing
Ware, Willis H. – EDUCOM, 1984
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Descriptors: Computer Science, Higher Education, Information Systems, Privacy
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime

Virunurm, Valdeko; Gaunt, Roger N. – New Directions for Institutional Research, 1977
Sophisticated computer technology now allows for increasingly adaptable privacy safeguards. Various protection mechanisms are described, including password technology and encryption techniques, and administrative guidelines are offered. (Editor/LBH)
Descriptors: Computer Science, Confidential Records, Consumer Protection, Data Collection
Petrova, Raina; Tibrewal, Abhilasha; Sobh, Tarek M. – Journal of STEM Education: Innovations and Research, 2006
In keeping with the outcome-based assessment outlined by ABET's Education Criteria 2000, the School of Engineering at the University of Bridgeport has defined fifteen general student outcomes for its computer engineering program. These outcomes form the basis of its instructional program and assessment activities. In assessing and monitoring the…
Descriptors: Engineering Education, STEM Education, Computer Science Education, Goal Orientation
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers