Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Academic Degrees | 4 |
Information Technology | 4 |
Computer Science Education | 3 |
Certification | 2 |
Employment Qualifications | 2 |
Information Systems | 2 |
Labor Force Development | 2 |
Student Attitudes | 2 |
Teaching Methods | 2 |
Academic Achievement | 1 |
Best Practices | 1 |
More ▼ |
Source
Australian Educational… | 1 |
IEEE Transactions on Education | 1 |
Journal of Cybersecurity… | 1 |
Journal of Educational… | 1 |
Author
Andersson, David | 1 |
Binh Tran | 1 |
Dermoudy, Julian | 1 |
Finke, Doug | 1 |
German, Dan-Adrian | 1 |
Hughes, Ciaran | 1 |
Karen C. Benson | 1 |
Lewandowski, H. J. | 1 |
Lewis, Ian | 1 |
Lorraine Jonassen | 1 |
Merzbacher, Celia | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Australia | 1 |
Georgia | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hughes, Ciaran; Finke, Doug; German, Dan-Adrian; Merzbacher, Celia; Vora, Patrick M.; Lewandowski, H. J. – IEEE Transactions on Education, 2022
Background: Quantum information science and technology (QIST) has progressed significantly in the last decade, such that it is no longer solely in the domain of research labs, but is now beginning to be developed for, and applied in, industrial applications and products. With the emergence of this new quantum industry, a new workforce trained in…
Descriptors: Needs Assessment, Educational Policy, Quantum Mechanics, Information Science
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
de Salas, Kristy; Lewis, Ian; Dermoudy, Julian – Australian Educational Computing, 2014
Within existing ICT degrees there is a widely-held belief that content must be tailored for different "kinds" of students--often two differing student groups: a technical group requiring detailed Computer Science knowledge and a separate group requiring less technical, more strategic ICT knowledge and skills. Our institution has produced…
Descriptors: Cognitive Style, Computer Science, Information Technology, Technological Literacy
Andersson, David; Reimers, Karl – Journal of Educational Technology, 2009
The fields of Computer Information Systems (CIS) and Information Technology (IT) are experiencing rapid change. In 2003, an analysis of IT degree programs and those of competing disciplines at 10 post-secondary institutions concluded that an information technology program is perceived differently from information systems and computer science. In…
Descriptors: Information Systems, Information Technology, Certification, Computer Science Education