Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Automation | 4 |
Computer Security | 4 |
Information Security | 4 |
Computer System Design | 2 |
Information Management | 2 |
Access to Information | 1 |
Active Learning | 1 |
Archives | 1 |
Change Strategies | 1 |
College Students | 1 |
Computer Simulation | 1 |
More ▼ |
Source
American School & University | 1 |
Education and Information… | 1 |
Information Systems Education… | 1 |
School Business Affairs | 1 |
Author
Alawneh, John | 1 |
Jan Vykopal | 1 |
Ján Dovjak | 1 |
Marquardson, Jim | 1 |
Pavel Celeda | 1 |
Pearring, John | 1 |
Valdemar Švábenský | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 2 |
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security