Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Science Education | 4 |
| Computer Security | 4 |
| Computer Software | 4 |
| Computer System Design | 4 |
| Instructional Design | 4 |
| Information Security | 3 |
| Case Method (Teaching… | 2 |
| Class Activities | 2 |
| College Instruction | 2 |
| College Students | 2 |
| Databases | 2 |
| More ▼ | |
Source
| Association Supporting… | 1 |
| Educational Technology &… | 1 |
| Interactive Technology and… | 1 |
| TechTrends: Linking Research… | 1 |
Author
| Alverez, Omar | 1 |
| Bettati, Riccardo | 1 |
| Campbell, Jackie | 1 |
| Chen, Li-Chiou | 1 |
| Cifuentes, Laurent | 1 |
| Mercer, Rene | 1 |
| Smith, Peter, Ed. | 1 |
| Tao, Lixin | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 2 |
| Collected Works - Proceedings | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
| Teachers | 1 |
Location
| New York | 1 |
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cifuentes, Laurent; Mercer, Rene; Alverez, Omar; Bettati, Riccardo – TechTrends: Linking Research and Practice to Improve Learning, 2010
We report on the design, development, implementation, and evaluation of a case-based instructional environment designed for learning network engineering skills for cybersecurity. We describe the societal problem addressed, the theory-based solution, and the preliminary testing and evaluation of that solution. We identify an architecture for…
Descriptors: Case Method (Teaching Technique), Problem Solving, Scaffolding (Teaching Technique), Instructional Design
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges

Peer reviewed
Direct link
