Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Evaluators | 4 |
Information Security | 4 |
Crime | 2 |
Evidence | 2 |
Academic Accommodations… | 1 |
Accountability | 1 |
Accuracy | 1 |
Adult Basic Education | 1 |
Adult Education | 1 |
Adult Literacy | 1 |
Alternative Assessment | 1 |
More ▼ |
Source
Cognitive Research:… | 1 |
Florida Department of… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Author
Belshaw, Scott H. | 1 |
Dror, Itiel E. | 1 |
Dunn, James D. | 1 |
Green, Andrew | 1 |
Growns, Bethany | 1 |
Salerno, Jessica M. | 1 |
Schweitzer, N. J. | 1 |
Towler, Alice | 1 |
Woszczynski, Amy B. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Guides - Non-Classroom | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Adult Education | 1 |
High Schools | 1 |
Audience
Practitioners | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Test of Adult Basic Education | 1 |
What Works Clearinghouse Rating
Growns, Bethany; Towler, Alice; Dunn, James D.; Salerno, Jessica M.; Schweitzer, N. J.; Dror, Itiel E. – Cognitive Research: Principles and Implications, 2022
Forensic science practitioners compare visual evidence samples (e.g. fingerprints) and decide if they originate from the same person or different people (i.e. fingerprint 'matching'). These tasks are perceptually and cognitively complex--even practising professionals can make errors--and what limited research exists suggests that existing…
Descriptors: Crime, Evidence, Sampling, Statistics Education
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Woszczynski, Amy B.; Green, Andrew – Journal of Information Systems Education, 2017
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning…
Descriptors: Outcomes of Education, Competition, Information Systems, National Security
Florida Department of Education, 2017
This technical assistance paper provides guidance to individuals with test administration responsibilities in adult education programs. These policies apply to the approved assessments that programs may use to report educational gains in compliance with the National Reporting System (NRS) requirements. The NRS is the accountability system for the…
Descriptors: Adult Education, Educational Assessment, Testing, Accountability