NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Emmanuel Wansi – ProQuest LLC, 2023
Shortages within the cybersecurity workforce are not new; fluctuations in supply and demand, fiscal and monetary constraints, and technological advances have influenced changes within the cybersecurity workforce nationally and globally. Cloud computing and the Internet of Things (IoT) impact many different cybersecurity roles within different…
Descriptors: Evaluation, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Tuttle, Mark S. – MOBIUS, 1983
Physicians wishing to become computer literate face two immediate problems. First, there is no readily available nor universally accepted statement of what such literacy should entail, and second, such pedagogic mechanisms as exist are not widely available. This paper addresses both problems. (SSH)
Descriptors: Computer Literacy, Computer Science Education, Computer Storage Devices, Continuing Education
Storey, Patrick B. – MOBIUS, 1983
This article provides an attempt to project the way in which a computer-based approach to continuing medical education might emerge based on the present perception of what patient care, teaching, and learning are like. (SSH)
Descriptors: Computer Literacy, Computer Science Education, Computer Storage Devices, Information Storage
Tanner, Dennis F.; Bane, Robert K. – Technological Horizons in Education, 1988
Examines the current development of computer compact disk storage devices (CD-ROM). Describes the basics of how the CD-ROM operates and identifies educational uses. Lists companies currently providing CD-ROM software and producing CD-ROM players. (MVL)
Descriptors: College Science, Computer Oriented Programs, Computer Science Education, Computer Software