Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Engineering | 2 |
| Information Security | 2 |
| Algorithms | 1 |
| Business Schools | 1 |
| Computer Networks | 1 |
| Computer Science Education | 1 |
| Computer Simulation | 1 |
| Crime Prevention | 1 |
| Information Storage | 1 |
| Learning Objectives | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 1 |
| Journal Articles | 1 |
| Reports - Research | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation

Peer reviewed
Direct link
